Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-4032 |
CWE-ID | CWE-684 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Python Universal components / Libraries / Scripting languages |
Vendor | Python.org |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU95157
Risk: Medium
CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-4032
CWE-ID:
CWE-684 - Incorrect Provision of Specified Functionality
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists within the "ipaddress" module that contains incorrect information and private and public IP addresses for IPv4 and IPv6 protocols. This affects the is_private and is_global properties of the
ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and
ipaddress.IPv6Network classes. A remote attacker can bypass implemented security restrictions based on IP addresses or perform other actions, depending on the application's capabilities.
Install updates from vendor's website.
Vulnerable software versionsPython: 3.8 - 3.12.3
CPE2.3http://github.com/python/cpython/issues/113171
http://github.com/python/cpython/pull/113179
http://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
http://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
http://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
http://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
http://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
http://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
http://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
http://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
http://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
http://www.openwall.com/lists/oss-security/2024/06/17/3
http://security.netapp.com/advisory/ntap-20240726-0004/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.