CVE-2024-4030
Vulnerability from cvelistv5
Published
2024-05-07 21:02
Modified
2024-09-07 02:44
Severity ?
EPSS score ?
Summary
tempfile.mkdtemp() may be readable and writeable by all users on Windows
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Python Software Foundation | CPython |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:python:cpython:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "cpython", "vendor": "python", "versions": [ { "status": "affected", "version": "0" }, { "status": "affected", "version": "3.13.0a1" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-4030", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-08T15:32:37.215710Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:55:02.857Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:26:57.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PRGS5OR3N3PNPT4BMV2VAGN5GMUI5636/" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://github.com/python/cpython/issues/118486" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/35c799d79177b962ddace2fa068101465570a29a" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/5130731c9e779b97d00a24f54cdce73ce9975dfd" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/66f8bb76a15e64a1bb7688b177ed29e26230fdee" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/6d0850c4c8188035643586ab4d8ec2468abd699e" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/91e3669e01245185569d09e9e6e11641282971ee" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/94591dca510c796c7d40e9b4167ea56f2fdf28ca" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/c8f868dc52f98011d0f9b459b6487920bfb0ac4d" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/d86b49411753bf2c83291e3a14ae43fefded2f84" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/e1dfa978b1ad210d551385ad8073ec6154f53763" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/python/cpython/commit/eb29e2f5905da93333d1ce78bc98b151e763ff46" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240705-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "CPython", "repo": "https://github.com/python/cpython", "vendor": "Python Software Foundation", "versions": [ { "lessThan": "3.8.20", "status": "affected", "version": "0", "versionType": "python" }, { "lessThan": "3.9.20", "status": "affected", "version": "3.9.0", "versionType": "python" }, { "lessThan": "3.10.15", "status": "affected", "version": "3.10.0", "versionType": "python" }, { "lessThan": "3.11.10", "status": "affected", "version": "3.11.0", "versionType": "python" }, { "lessThan": "3.12.4", "status": "affected", "version": "3.12.0", "versionType": "python" }, { "lessThan": "3.13.0b1", "status": "affected", "version": "3.13.0a1", "versionType": "python" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aobo Wang" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eOn Windows a directory returned by \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003etempfile.mkdtemp()\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003e would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\u003c/span\u003e\u003c/p\u003e\u003cp\u003e\u003cspan style=\"background-color: transparent;\"\u003eIf you\u2019re not using Windows or haven\u2019t changed the temporary directory location then you aren\u2019t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\u003c/span\u003e\u003c/p\u003e\u003cspan style=\"background-color: transparent;\"\u003eThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \u201c700\u201d for the \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003emkdir\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003e function on Windows which is used by \u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003emkdtemp()\u003c/span\u003e\u003cspan style=\"background-color: transparent;\"\u003e to ensure the newly created directory has the proper permissions.\u003c/span\u003e\u003cbr\u003e" } ], "value": "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you\u2019re not using Windows or haven\u2019t changed the temporary directory location then you aren\u2019t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \u201c700\u201d for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions." } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-07T02:44:36.613Z", "orgId": "28c92f92-d60d-412d-b760-e73465c3df22", "shortName": "PSF" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/PRGS5OR3N3PNPT4BMV2VAGN5GMUI5636/" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/python/cpython/issues/118486" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/35c799d79177b962ddace2fa068101465570a29a" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/5130731c9e779b97d00a24f54cdce73ce9975dfd" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/66f8bb76a15e64a1bb7688b177ed29e26230fdee" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/6d0850c4c8188035643586ab4d8ec2468abd699e" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/91e3669e01245185569d09e9e6e11641282971ee" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/94591dca510c796c7d40e9b4167ea56f2fdf28ca" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/c8f868dc52f98011d0f9b459b6487920bfb0ac4d" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/d86b49411753bf2c83291e3a14ae43fefded2f84" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/e1dfa978b1ad210d551385ad8073ec6154f53763" }, { "tags": [ "patch" ], "url": "https://github.com/python/cpython/commit/eb29e2f5905da93333d1ce78bc98b151e763ff46" }, { "url": "https://security.netapp.com/advisory/ntap-20240705-0005/" } ], "source": { "discovery": "UNKNOWN" }, "title": "tempfile.mkdtemp() may be readable and writeable by all users on Windows", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "28c92f92-d60d-412d-b760-e73465c3df22", "assignerShortName": "PSF", "cveId": "CVE-2024-4030", "datePublished": "2024-05-07T21:02:55.284Z", "dateReserved": "2024-04-22T14:49:13.316Z", "dateUpdated": "2024-09-07T02:44:36.613Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-4030\",\"sourceIdentifier\":\"cna@python.org\",\"published\":\"2024-05-07T21:15:09.467\",\"lastModified\":\"2024-09-07T03:15:09.917\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\\n\\nIf you\u2019re not using Windows or haven\u2019t changed the temporary directory location then you aren\u2019t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\\n\\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix \u201c700\u201d for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.\"},{\"lang\":\"es\",\"value\":\"En Windows, un directorio devuelto por tempfile.mkdtemp() no siempre tendr\u00eda permisos configurados para restringir la lectura y escritura en el directorio temporal por parte de otros usuarios, sino que normalmente heredar\u00eda los permisos correctos de la ubicaci\u00f3n predeterminada. Es posible que las configuraciones alternativas o los usuarios sin un directorio de perfil no tengan los permisos previstos. Si no est\u00e1 utilizando Windows o no ha cambiado la ubicaci\u00f3n del directorio temporal, esta vulnerabilidad no le afecta. En otras plataformas, el directorio devuelto solo el usuario actual puede leerlo y escribirlo constantemente. Este problema se debi\u00f3 a que Python no admite permisos de Unix en Windows. La soluci\u00f3n agrega soporte para Unix \u201c700\u201d para la funci\u00f3n mkdir en Windows que utiliza mkdtemp() para garantizar que el directorio reci\u00e9n creado tenga los permisos adecuados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"cna@python.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"references\":[{\"url\":\"https://github.com/python/cpython/commit/35c799d79177b962ddace2fa068101465570a29a\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/5130731c9e779b97d00a24f54cdce73ce9975dfd\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/66f8bb76a15e64a1bb7688b177ed29e26230fdee\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/6d0850c4c8188035643586ab4d8ec2468abd699e\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/91e3669e01245185569d09e9e6e11641282971ee\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/94591dca510c796c7d40e9b4167ea56f2fdf28ca\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/c8f868dc52f98011d0f9b459b6487920bfb0ac4d\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/d86b49411753bf2c83291e3a14ae43fefded2f84\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/e1dfa978b1ad210d551385ad8073ec6154f53763\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/commit/eb29e2f5905da93333d1ce78bc98b151e763ff46\",\"source\":\"cna@python.org\"},{\"url\":\"https://github.com/python/cpython/issues/118486\",\"source\":\"cna@python.org\"},{\"url\":\"https://mail.python.org/archives/list/security-announce@python.org/thread/PRGS5OR3N3PNPT4BMV2VAGN5GMUI5636/\",\"source\":\"cna@python.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240705-0005/\",\"source\":\"cna@python.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.