5.7

CVE-2021-3426

There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.

Data is provided by the National Vulnerability Database (NVD)
PythonPython Version < 2.7.18
PythonPython Version >= 3.6.0 < 3.6.13
PythonPython Version >= 3.7.0 < 3.7.10
PythonPython Version >= 3.8.0 < 3.8.8
PythonPython Version >= 3.9.0 < 3.9.3
PythonPython Version3.10.0 Updatealpha1
PythonPython Version3.10.0 Updatealpha2
PythonPython Version3.10.0 Updatealpha3
PythonPython Version3.10.0 Updatealpha4
PythonPython Version3.10.0 Updatealpha5
PythonPython Version3.10.0 Updatealpha6
FedoraprojectFedora Version32
FedoraprojectFedora Version33
FedoraprojectFedora Version34
DebianDebian Linux Version9.0
RedhatEnterprise Linux Version8.0
NetappCloud Backup Version-
NetappSnapcenter Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.249
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.7 2.1 3.6
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 2.7 5.1 2.9
AV:A/AC:L/Au:S/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

https://bugzilla.redhat.com/show_bug.cgi?id=1935913
Patch
Third Party Advisory
Issue Tracking