In Python prior to 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local malicious user to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) up to and including 3.7.12, 3.8.x up to and including 3.8.12, 3.9.x up to and including 3.9.10, and 3.10.x up to and including 3.10.2.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
python python 3.11.0 |
||
python python |
||
netapp ontap select deploy administration utility - |
||
netapp active iq unified manager - |