

The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This module helps break Uniform Resource Locator (URL) strings into components. The highest threat from this vulnerability is to system availability.Ī flaw was found in Python, specifically within the urllib.parse module.
APPLE JAVA UPDATE 1.4 2 PC CODE
An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The greatest threat that this flaw poses is to application availability.Ī flaw was found in python. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. There's a flaw in urllib's AbstractBasicAuthHandler class.

A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. To exploit, an administrator must have installed Python for all users and enabled PATH entries. The installer may allow a local attacker to add user-writable directories to the system search path. In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. Zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. It only implements basic security checks." NOTE: this is disputed by a third party because the documentation page states "Warning: rver is not recommended for production. ** DISPUTED ** Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. The issue is how the FTP client trusts the host from the PASV response by default. If you want to see a complete summary for this CPE, please contact us.Ī flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode.
