7
CVSSv3

CVE-2022-26488

Published: 10/03/2022 Updated: 03/09/2022
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Python prior to 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local malicious user to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) up to and including 3.7.12, 3.8.x up to and including 3.8.12, 3.9.x up to and including 3.9.10, and 3.10.x up to and including 3.10.2.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

python python 3.11.0

python python

netapp ontap select deploy administration utility -

netapp active iq unified manager -

Vendor Advisories

Python is used by IBM Robotic Process Automation as part of the NLP command implementation and part of the base container image for Antivirus and OCR services ...

Github Repositories

CVE-2022-26488 In Python before 3103 on Windows, local users can gain privileges because the search path is inadequately secured The installer may allow a local attacker to add user-writable directories to the system search path To exploit, an administrator must have installed Python for all users and enabled PATH entries A non-administrative user can trigger a repair that