In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
History

Sat, 05 Oct 2024 01:00:00 +0000

Type Values Removed Values Added
Title python: local privilege escalation via search path in Windows
References
Metrics threat_severity

None

threat_severity

Moderate


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-03-07T17:26:04

Updated: 2024-08-03T05:03:32.791Z

Reserved: 2022-03-06T00:00:00

Link: CVE-2022-26488

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-10T17:47:45.383

Modified: 2024-11-21T06:54:02.590

Link: CVE-2022-26488

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-04T16:38:49Z

Links: CVE-2022-26488 - Bugzilla