Access Control Bypass Affecting restrictedpython package, versions [,5.4)[6.0,6.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-RESTRICTEDPYTHON-5876648
  • published31 Aug 2023
  • disclosed30 Aug 2023
  • creditAbhishek Govindarasu, Ankush Menat, Ward Theunisse

Introduced: 30 Aug 2023

CVE-2023-41039  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade RestrictedPython to version 5.4, 6.2 or higher.

Overview

RestrictedPython is a RestrictedPython is a defined subset of the Python language which allows to provide a program input into a trusted environment.

Affected versions of this package are vulnerable to Access Control Bypass via the format and format_map methods of str (and unicode) and string.Formatter. An attacker can lead to critical information disclosure by controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects the attacker can access.

References

CVSS Scores

version 3.1