Impact
The vulnerability exists because pkgutil.get_data() does not enforce the documented restrictions on its resource argument, exposing the function to path traversal attacks. This weakness (CWE-22) allows an attacker to read arbitrary files that are accessible to the Python process. The impact is local file disclosure, potentially revealing sensitive configuration or system files used by the Python application.
Affected Systems
The affected product is CPython, provided by the Python Software Foundation. No specific version range is listed in the data, indicating that the issue may affect any distribution that includes the unpatched pkgutil implementation. Users should consider whether they are running a CPython version that includes the fix from pull request 146122.
Risk and Exploitability
The CVSS score is 2.1, classifying the vulnerability as low severity. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog, suggesting limited exploitation potential. The likely attack vector is local: an attacker with the ability to execute or control a Python program can invoke pkgutil.get_data() with a crafted resource argument to read unintended files. No public exploit is known.
OpenCVE Enrichment