Vulnerability Name: | CVE-2020-15523 (CCN-184610) | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-03-10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-03-10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-07-05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). Note: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows. | ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-427 CWE-908 | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-15523 Source: CCN Type: Python Issue29778 [CVE-2020-15523] _Py_CheckPython3 uses uninitialized dllpath when embedder sets module path with Py_SetPath Source: MISC Type: Issue Tracking, Patch, Vendor Advisory https://bugs.python.org/issue29778 Source: XF Type: UNKNOWN python-cve202015523-code-exec(184610) Source: MISC Type: Patch, Third Party Advisory https://github.com/python/cpython/pull/21297 Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://security.netapp.com/advisory/ntap-20210312-0004/ Source: CCN Type: IBM Security Bulletin 6830257 (Robotic Process Automation) Multiple security vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak Source: CCN Type: Python Web site Python | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |