{"api_version":"1","generated_at":"2026-04-19T08:15:44+00:00","cve":"CVE-2023-41105","urls":{"html":"https://cve.report/CVE-2023-41105","api":"https://cve.report/api/cve/CVE-2023-41105.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-41105","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-41105"},"summary":{"title":"CVE-2023-41105","description":"An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-08-23 07:15:00","updated_at":"2023-11-07 04:20:00"},"problem_types":["CWE-426"],"metrics":[],"references":[{"url":"https://github.com/python/cpython/pull/107982","name":"https://github.com/python/cpython/pull/107982","refsource":"MISC","tags":[],"title":"[3.11] gh-106242: Fix path truncation in os.path.normpath (GH-106816) by zooba · Pull Request #107982 · python/cpython · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://mail.python.org/archives/list/security-announce@python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/","name":"https://mail.python.org/archives/list/security-announce@python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/","refsource":"CONFIRM","tags":[],"title":"Mailman 3 \n[CVE-2023-41105] os.path.normpath() truncates on null bytes - Security-announce - python.org","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/python/cpython/pull/107983","name":"https://github.com/python/cpython/pull/107983","refsource":"MISC","tags":[],"title":"gh-106242: Minor fixup to avoid compiler warnings by zooba · Pull Request #107983 · python/cpython · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/","name":"https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/","refsource":"","tags":[],"title":"Mailman 3 \n[CVE-2023-41105] os.path.normpath() truncates on null bytes - Security-announce - python.org","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/python/cpython/issues/106242","name":"https://github.com/python/cpython/issues/106242","refsource":"MISC","tags":[],"title":"os.path.normpath truncates input on null bytes in 3.11, but not 3.10 · Issue #106242 · python/cpython · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20231006-0015/","name":"https://security.netapp.com/advisory/ntap-20231006-0015/","refsource":"CONFIRM","tags":[],"title":"CVE-2023-41105 Python Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/python/cpython/pull/107981","name":"https://github.com/python/cpython/pull/107981","refsource":"MISC","tags":[],"title":"[3.12] gh-106242: Fix path truncation in os.path.normpath (GH-106816) by zooba · Pull Request #107981 · python/cpython · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-41105","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41105","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"41105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"active_iq_unified_manager","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"41105","vulnerable":"1","versionEndIncluding":"3.11.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"python","cpe5":"python","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-41105","qid":"161128","title":"Oracle Enterprise Linux Security Update for python3.11 (ELSA-2023-6494)"},{"cve":"CVE-2023-41105","qid":"161148","title":"Oracle Enterprise Linux Security Update for python3.11 (ELSA-2023-7024)"},{"cve":"CVE-2023-41105","qid":"199992","title":"Ubuntu Security Notification for Python Vulnerability (USN-6547-1)"},{"cve":"CVE-2023-41105","qid":"242304","title":"Red Hat Update for python3.11 (RHSA-2023:6494)"},{"cve":"CVE-2023-41105","qid":"242412","title":"Red Hat Update for python3.11 (RHSA-2023:7024)"},{"cve":"CVE-2023-41105","qid":"296105","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 63.157.1 Missing (CPUOCT2023)"},{"cve":"CVE-2023-41105","qid":"755009","title":"SUSE Enterprise Linux Security Update for python3 (SUSE-SU-2023:3939-1)"},{"cve":"CVE-2023-41105","qid":"755025","title":"SUSE Enterprise Linux Security Update for python311 (SUSE-SU-2023:3943-1)"},{"cve":"CVE-2023-41105","qid":"941365","title":"AlmaLinux Security Update for python3.11 (ALSA-2023:6494)"},{"cve":"CVE-2023-41105","qid":"941427","title":"AlmaLinux Security Update for python3.11 (ALSA-2023:7024)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-41105","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://github.com/python/cpython/issues/106242","refsource":"MISC","name":"https://github.com/python/cpython/issues/106242"},{"url":"https://github.com/python/cpython/pull/107983","refsource":"MISC","name":"https://github.com/python/cpython/pull/107983"},{"url":"https://github.com/python/cpython/pull/107981","refsource":"MISC","name":"https://github.com/python/cpython/pull/107981"},{"url":"https://github.com/python/cpython/pull/107982","refsource":"MISC","name":"https://github.com/python/cpython/pull/107982"},{"refsource":"CONFIRM","name":"https://mail.python.org/archives/list/security-announce@python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/","url":"https://mail.python.org/archives/list/security-announce@python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20231006-0015/","url":"https://security.netapp.com/advisory/ntap-20231006-0015/"}]}},"nvd":{"publishedDate":"2023-08-23 07:15:00","lastModifiedDate":"2023-11-07 04:20:00","problem_types":["CWE-426"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*","versionStartIncluding":"3.11.0","versionEndIncluding":"3.11.4","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}