Total vulnerabilities in the database
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
Software | From | Fixed in |
---|---|---|
python / python | - | 3.7.12.x |
python / python | 3.8.0 | 3.8.12.x |
python / python | 3.9.0 | 3.9.10.x |
python / python | 3.10.0 | 3.10.2.x |
python / python | 3.11.0-alpha2 | 3.11.0-alpha2.x |
python / python | 3.11.0-alpha3 | 3.11.0-alpha3.x |
python / python | 3.11.0-alpha4 | 3.11.0-alpha4.x |
python / python | 3.11.0-alpha5 | 3.11.0-alpha5.x |
python / python | 3.11.0-alpha6 | 3.11.0-alpha6.x |
python / python | 3.11.0-alpha1 | 3.11.0-alpha1.x |