CVE-2024-47532 Affecting restrictedpython package, versions <8.0-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.05% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-RESTRICTEDPYTHON-8132183
  • published1 Oct 2024
  • disclosed30 Sept 2024

Introduced: 30 Sep 2024

CVE-2024-47532  (opens in a new tab)

How to fix?

Upgrade Debian:13 restrictedpython to version 8.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream restrictedpython package and not the restrictedpython package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.

CVSS Scores

version 3.1