OS Command Injection Affecting python36:3.6/python3-wheel-wheel package, versions <1:0.31.1-2.module+el8.4.0+15040+36b018e7.1


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-PYTHON36-8600612
  • published1 Jan 2025
  • disclosed24 Nov 2024

Introduced: 24 Nov 2024

CVE-2024-53899  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade RHEL:8 python36:3.6/python3-wheel-wheel to version 1:0.31.1-2.module+el8.4.0+15040+36b018e7.1 or higher.
This issue was patched in RHSA-2025:0002.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python36:3.6/python3-wheel-wheel package and not the python36:3.6/python3-wheel-wheel package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.

CVSS Scores

version 3.1