QID 375419

Date Published: 2021-03-30

QID 375419: Python3 Remote Code Execution Vulnerability

Python is an interpreted, high-level and general-purpose programming language.

A vulnerability in Python 3 may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.

Affected Versions:
Python Versions 3.X up to 3.6.12
Python Versions 3.7.0 up to 3.7.9
Python Versions 3.8.0 up to 3.8.7
Python Versions 3.9.0 up to 3.9.1

QID Detection Logic(Authenticated):
This checks for version information using the python3 --version

On successfully exploited it could lead to remote code execution, which may aid in further attacks.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Vendor has release fix to this issue.
    Refer to issue trackerhere to address this vulnerability and obtain further details.

    CVEs related to QID 375419

    Software Advisories
    Advisory ID Software Component Link
    CVE-2021-3177 URL Logo python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html