Description
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-31046 | In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2. |
References
History
Sat, 05 Oct 2024 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | python: local privilege escalation via search path in Windows | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T05:03:32.791Z
Reserved: 2022-03-06T00:00:00.000Z
Link: CVE-2022-26488
No data.
Status : Modified
Published: 2022-03-10T17:47:45.383
Modified: 2024-11-21T06:54:02.590
Link: CVE-2022-26488
OpenCVE Enrichment
No data.
Weaknesses
EUVD