9.1

CVE-2019-9948

Exploit

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.

Data is provided by the National Vulnerability Database (NVD)
PythonPython Version >= 2.0 < 2.7.17
PythonPython Version >= 3.5.0 < 3.5.8
PythonPython Version >= 3.6.0 < 3.6.9
PythonPython Version >= 3.7.0 < 3.7.4
OpensuseLeap Version15.0
OpensuseLeap Version42.3
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
FedoraprojectFedora Version29
FedoraprojectFedora Version30
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionesm
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
RedhatEnterprise Linux Eus Version8.6
RedhatEnterprise Linux Tus Version8.2
RedhatEnterprise Linux Tus Version8.4
RedhatEnterprise Linux Tus Version8.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.94% 0.755
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.1 3.9 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
nvd@nist.gov 6.4 10 4.9
AV:N/AC:L/Au:N/C:P/I:P/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

https://usn.ubuntu.com/4127-1/
Third Party Advisory
https://usn.ubuntu.com/4127-2/
Third Party Advisory
https://seclists.org/bugtraq/2019/Oct/29
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/107549
Third Party Advisory
VDB Entry
https://bugs.python.org/issue35907
Vendor Advisory
Exploit
Issue Tracking