In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
Metrics
Affected Vendors & Products
References
History
Sat, 05 Oct 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | python: local privilege escalation via search path in Windows | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-07T17:26:04
Updated: 2024-08-03T05:03:32.791Z
Reserved: 2022-03-06T00:00:00
Link: CVE-2022-26488
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-03-10T17:47:45.383
Modified: 2024-11-21T06:54:02.590
Link: CVE-2022-26488
Redhat