PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.
History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Schrodinger
Schrodinger pymol
Weaknesses CWE-94
CPEs cpe:2.3:a:schrodinger:pymol:2.5.0:*:*:*:*:*:*:*
Vendors & Products Schrodinger
Schrodinger pymol
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 Nov 2024 23:00:00 +0000

Type Values Removed Values Added
Description PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-11-11T00:00:00

Updated: 2024-11-19T19:07:43.887Z

Reserved: 2024-10-28T00:00:00

Link: CVE-2024-50636

cve-icon Vulnrichment

Updated: 2024-11-19T19:07:37.253Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-11T23:15:05.833

Modified: 2024-11-19T19:35:14.833

Link: CVE-2024-50636

cve-icon Redhat

No data.