CVE-2020-15523
Vulnerability from cvelistv5
Published
2020-07-04 22:54
Modified
2024-08-04 13:15
Severity
Summary
In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.
References
SourceURLTags
cve@mitre.orghttps://bugs.python.org/issue29778Issue Tracking, Patch, Vendor Advisory
cve@mitre.orghttps://github.com/python/cpython/pull/21297Patch, Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20210312-0004/Issue Tracking, Patch, Third Party Advisory
Impacted products
VendorProduct
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:15:20.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.python.org/issue29778"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/python/cpython/pull/21297"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20210312-0004/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-12T12:06:36",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.python.org/issue29778"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/python/cpython/pull/21297"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20210312-0004/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-15523",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugs.python.org/issue29778",
              "refsource": "MISC",
              "url": "https://bugs.python.org/issue29778"
            },
            {
              "name": "https://github.com/python/cpython/pull/21297",
              "refsource": "MISC",
              "url": "https://github.com/python/cpython/pull/21297"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20210312-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20210312-0004/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15523",
    "datePublished": "2020-07-04T22:54:00",
    "dateReserved": "2020-07-04T00:00:00",
    "dateUpdated": "2024-08-04T13:15:20.864Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-15523\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-07-04T23:15:10.313\",\"lastModified\":\"2022-07-05T18:54:06.023\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.\"},{\"lang\":\"es\",\"value\":\"En Python versiones 3.6 hasta 3.6.10, 3.7 hasta 3.7.8, 3.8 hasta 3.8.4rc1 y 3.9 hasta 3.9.0b4 en Windows, se puede usar una python3.dll de tipo caballo de Troya en los casos en que CPython est\u00e1 incorporado en una aplicaci\u00f3n nativa. Esto se produce porque python3X.dll puede usar una ruta de b\u00fasqueda no v\u00e1lida para cargar python3.dll (despu\u00e9s de que haya sido usado Py_SetPath). NOTA: este problema NO PUEDE ocurrir cuando se usa python.exe desde una instalaci\u00f3n est\u00e1ndar (no incorporada) de Python en Windows\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":6.9},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"},{\"lang\":\"en\",\"value\":\"CWE-908\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.10\",\"matchCriteriaId\":\"190C1D3B-648D-46B5-AB7E-8575DB03585B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.6.12\",\"matchCriteriaId\":\"7EB6A6FC-6C82-4543-8DAA-96FF2BACDB5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.7.0\",\"versionEndExcluding\":\"3.7.9\",\"matchCriteriaId\":\"045171F0-A76D-4385-B2AE-51479B425C45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0\",\"versionEndExcluding\":\"3.8.4\",\"matchCriteriaId\":\"E9409BD5-670F-4C69-A4D2-ACF9AD8F335B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.8.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"25F65784-2F53-467D-8E72-02F619F1D73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E45B3B6-8458-4C88-99FC-C21D6987AA41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D05F0EE6-213A-48AF-8217-502681E10421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"58906E55-8502-42DC-9203-AC6B337A7A85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"80D043C7-0760-4B00-A487-533E1CF86AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"73519BF7-7F38-441D-AA72-574AD94E7E5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D498F6E9-511C-451C-A39E-8514774D9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D803324B-B2E7-47FA-8E2C-E456B6940FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F5113CE-A28F-4319-8395-FB96542D8FFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCE9E749-8464-4753-86E6-CFE9FB834032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.9.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D52E7C-0317-476B-B5EB-2A5FAD567144\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"}]}]}],\"references\":[{\"url\":\"https://bugs.python.org/issue29778\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/python/cpython/pull/21297\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20210312-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...