The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Injection vulnerabilities in an interactive lesson.
Start learningUpgrade pyinstaller
to version 6.0.0 or higher.
pyinstaller is a package that bundles a Python application and all its dependencies into a single package
Affected versions of this package are vulnerable to Arbitrary Code Injection in the bootstrap
process. An attacker can achieve arbitrary code execution by placing malicious files or directories in the same location as a vulnerable PyInstaller application. When the application starts, it can be tricked into loading and running the attacker's Python code due to how PyInstaller handles sys.path
and attempts to load an optional bytecode decryption module. If the application runs with elevated privileges, this can lead to local privilege escalation. This exploit works in both "onedir" and "onefile" modes, but only if the optional bytecode encryption feature was not enabled during the application's build.
Notes: This is only exploitable if the filesystem supports creation of files/directories that contain '?' in their name (i.e., non-Windows systems) and the attacker is able to determine the offset at which the PYZ archive is embedded in the executable.
This vulnerability can be mitigated by ensuring proper permissions on directories containing security-sensitive executables (for example, executables with the setuid
bit set).