fkie_cve-2024-4030
Vulnerability from fkie_nvd
Published
2024-05-07 21:15
Modified
2024-11-21 09:42
Severity ?
Summary
On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.
If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.
This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
References
Impacted products
Vendor | Product | Version |
---|
{ cveTags: [], descriptions: [ { lang: "en", value: "On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.\n\nIf you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.\n\nThis issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.", }, { lang: "es", value: "En Windows, un directorio devuelto por tempfile.mkdtemp() no siempre tendría permisos configurados para restringir la lectura y escritura en el directorio temporal por parte de otros usuarios, sino que normalmente heredaría los permisos correctos de la ubicación predeterminada. Es posible que las configuraciones alternativas o los usuarios sin un directorio de perfil no tengan los permisos previstos. Si no está utilizando Windows o no ha cambiado la ubicación del directorio temporal, esta vulnerabilidad no le afecta. En otras plataformas, el directorio devuelto solo el usuario actual puede leerlo y escribirlo constantemente. Este problema se debió a que Python no admite permisos de Unix en Windows. La solución agrega soporte para Unix “700” para la función mkdir en Windows que utiliza mkdtemp() para garantizar que el directorio recién creado tenga los permisos adecuados.", }, ], id: "CVE-2024-4030", lastModified: "2024-11-21T09:42:03.650", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.2, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-05-07T21:15:09.467", references: [ { source: "cna@python.org", url: "https://github.com/python/cpython/commit/35c799d79177b962ddace2fa068101465570a29a", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/5130731c9e779b97d00a24f54cdce73ce9975dfd", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/66f8bb76a15e64a1bb7688b177ed29e26230fdee", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/6d0850c4c8188035643586ab4d8ec2468abd699e", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/91e3669e01245185569d09e9e6e11641282971ee", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/94591dca510c796c7d40e9b4167ea56f2fdf28ca", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/c8f868dc52f98011d0f9b459b6487920bfb0ac4d", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/d86b49411753bf2c83291e3a14ae43fefded2f84", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/e1dfa978b1ad210d551385ad8073ec6154f53763", }, { source: "cna@python.org", url: "https://github.com/python/cpython/commit/eb29e2f5905da93333d1ce78bc98b151e763ff46", }, { source: "cna@python.org", url: "https://github.com/python/cpython/issues/118486", }, { source: "cna@python.org", url: "https://mail.python.org/archives/list/security-announce@python.org/thread/PRGS5OR3N3PNPT4BMV2VAGN5GMUI5636/", }, { source: "cna@python.org", url: "https://security.netapp.com/advisory/ntap-20240705-0005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/35c799d79177b962ddace2fa068101465570a29a", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/5130731c9e779b97d00a24f54cdce73ce9975dfd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/66f8bb76a15e64a1bb7688b177ed29e26230fdee", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/6d0850c4c8188035643586ab4d8ec2468abd699e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/81939dad77001556c527485d31a2d0f4a759033e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/8ed546679524140d8282175411fd141fe7df070d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/91e3669e01245185569d09e9e6e11641282971ee", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/94591dca510c796c7d40e9b4167ea56f2fdf28ca", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/c8f868dc52f98011d0f9b459b6487920bfb0ac4d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/d86b49411753bf2c83291e3a14ae43fefded2f84", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/e1dfa978b1ad210d551385ad8073ec6154f53763", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/commit/eb29e2f5905da93333d1ce78bc98b151e763ff46", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://github.com/python/cpython/issues/118486", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://mail.python.org/archives/list/security-announce@python.org/thread/PRGS5OR3N3PNPT4BMV2VAGN5GMUI5636/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20240705-0005/", }, ], sourceIdentifier: "cna@python.org", vulnStatus: "Awaiting Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-276", }, ], source: "cna@python.org", type: "Secondary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.