ID |
CVE-2022-35861
|
Sažetak |
pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.) |
Reference |
|
CVSS |
Base: | 4.6 |
Impact: | 6.4 |
Exploitability: | 3.9 |
|
Pristup |
Vektor | Složenost | Autentikacija |
LOCAL |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
PARTIAL |
PARTIAL |
|
CVSS vektor |
AV:L/AC:L/Au:N/C:P/I:P/A:P |
Zadnje važnije ažuriranje |
03-03-2023 - 19:26 |
Objavljeno |
17-07-2022 - 17:15 |