CVE-2022-26488
Severity CVSS v4.0:
Pending analysis
Type:
CWE-426
Untrusted Search Path
Publication date:
10/03/2022
Last modified:
07/11/2023
Description
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.7.12 (including) | |
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.8.0 (including) | 3.8.12 (including) |
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.9.0 (including) | 3.9.10 (including) |
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.10.0 (including) | 3.10.2 (including) |
| cpe:2.3:a:python:python:3.11.0:alpha1:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.11.0:alpha2:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.11.0:alpha3:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.11.0:alpha4:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.11.0:alpha5:*:*:*:*:*:* | ||
| cpe:2.3:a:python:python:3.11.0:alpha6:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* | ||
| cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* | ||
| cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



