PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Schrodinger
Schrodinger pymol |
|
Weaknesses | CWE-94 | |
CPEs | cpe:2.3:a:schrodinger:pymol:2.5.0:*:*:*:*:*:*:* | |
Vendors & Products |
Schrodinger
Schrodinger pymol |
|
Metrics |
cvssV3_1
|
Mon, 11 Nov 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-11-11T00:00:00
Updated: 2024-11-19T19:07:43.887Z
Reserved: 2024-10-28T00:00:00
Link: CVE-2024-50636
Vulnrichment
Updated: 2024-11-19T19:07:37.253Z
NVD
Status : Awaiting Analysis
Published: 2024-11-11T23:15:05.833
Modified: 2024-11-19T19:35:14.833
Link: CVE-2024-50636
Redhat
No data.