CVE-2023-41334 (GCVE-0-2023-41334)
Vulnerability from cvelistv5 – Published: 2024-03-18 18:48 – Updated: 2024-08-02 19:01
VLAI?
Summary
Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.
Severity ?
8.4 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:astropy_project:astropy:5.3.2:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "astropy",
"vendor": "astropy_project",
"versions": [
{
"status": "affected",
"version": "5.3.2"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-41334",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-02T15:20:41.705884Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-02T15:21:52.587Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:01:34.383Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf"
},
{
"name": "https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5"
},
{
"name": "https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "astropy",
"vendor": "astropy",
"versions": [
{
"status": "affected",
"version": "= 5.3.2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-18T18:48:14.795Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf"
},
{
"name": "https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5"
},
{
"name": "https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539"
}
],
"source": {
"advisory": "GHSA-h2x6-5jx5-46hf",
"discovery": "UNKNOWN"
},
"title": "astropy vulnerable to RCE in TranformGraph().to_dot_graph function"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-41334",
"datePublished": "2024-03-18T18:48:14.795Z",
"dateReserved": "2023-08-28T16:56:43.367Z",
"dateUpdated": "2024-08-02T19:01:34.383Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.\"}, {\"lang\": \"es\", \"value\": \"Astropy es un proyecto de astronom\\u00eda en Python que fomenta la interoperabilidad entre paquetes de astronom\\u00eda de Python. La versi\\u00f3n 5.3.2 del paquete principal de Astropy es vulnerable a la ejecuci\\u00f3n remota de c\\u00f3digo debido a una validaci\\u00f3n de entrada incorrecta en la funci\\u00f3n `TranformGraph().to_dot_graph`. Un usuario malintencionado puede proporcionar un comando o un archivo de script como valor para el argumento `savelayout`, que se colocar\\u00e1 como el primer valor en una lista de argumentos pasados a `subprocess.Popen`. Aunque se generar\\u00e1 un error, el comando o script se ejecutar\\u00e1 correctamente. La versi\\u00f3n 5.3.3 soluciona este problema.\"}]",
"id": "CVE-2023-41334",
"lastModified": "2024-11-21T08:21:05.907",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 5.9}]}",
"published": "2024-03-18T19:15:05.897",
"references": "[{\"url\": \"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-77\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-41334\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-03-18T19:15:05.897\",\"lastModified\":\"2024-11-21T08:21:05.907\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.\"},{\"lang\":\"es\",\"value\":\"Astropy es un proyecto de astronom\u00eda en Python que fomenta la interoperabilidad entre paquetes de astronom\u00eda de Python. La versi\u00f3n 5.3.2 del paquete principal de Astropy es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo debido a una validaci\u00f3n de entrada incorrecta en la funci\u00f3n `TranformGraph().to_dot_graph`. Un usuario malintencionado puede proporcionar un comando o un archivo de script como valor para el argumento `savelayout`, que se colocar\u00e1 como el primer valor en una lista de argumentos pasados a `subprocess.Popen`. Aunque se generar\u00e1 un error, el comando o script se ejecutar\u00e1 correctamente. La versi\u00f3n 5.3.3 soluciona este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"references\":[{\"url\":\"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\", \"name\": \"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\", \"name\": \"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\", \"name\": \"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:01:34.383Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-41334\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-02T15:20:41.705884Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:astropy_project:astropy:5.3.2:*:*:*:*:*:*:*\"], \"vendor\": \"astropy_project\", \"product\": \"astropy\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.3.2\"}], \"defaultStatus\": \"affected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-02T15:21:48.382Z\"}}], \"cna\": {\"title\": \"astropy vulnerable to RCE in TranformGraph().to_dot_graph function\", \"source\": {\"advisory\": \"GHSA-h2x6-5jx5-46hf\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"astropy\", \"product\": \"astropy\", \"versions\": [{\"status\": \"affected\", \"version\": \"= 5.3.2\"}]}], \"references\": [{\"url\": \"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\", \"name\": \"https://github.com/astropy/astropy/security/advisories/GHSA-h2x6-5jx5-46hf\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\", \"name\": \"https://github.com/astropy/astropy/commit/22057d37b1313f5f5a9b5783df0a091d978dccb5\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\", \"name\": \"https://github.com/astropy/astropy/blob/9b97d98802ee4f5350a62b681c35d8687ee81d91/astropy/coordinates/transformations.py#L539\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Astropy is a project for astronomy in Python that fosters interoperability between Python astronomy packages. Version 5.3.2 of the Astropy core package is vulnerable to remote code execution due to improper input validation in the `TranformGraph().to_dot_graph` function. A malicious user can provide a command or a script file as a value to the `savelayout` argument, which will be placed as the first value in a list of arguments passed to `subprocess.Popen`. Although an error will be raised, the command or script will be executed successfully. Version 5.3.3 fixes this issue.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-03-18T18:48:14.795Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-41334\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T19:01:34.383Z\", \"dateReserved\": \"2023-08-28T16:56:43.367Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-03-18T18:48:14.795Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…