First published: Mon Mar 07 2022(Updated: )
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | <=3.7.12 | |
Python Python | >=3.8.0<=3.8.12 | |
Python Python | >=3.9.0<=3.9.10 | |
Python Python | >=3.10.0<=3.10.2 | |
Python Python | =3.11.0-alpha1 | |
Python Python | =3.11.0-alpha2 | |
Python Python | =3.11.0-alpha3 | |
Python Python | =3.11.0-alpha4 | |
Python Python | =3.11.0-alpha5 | |
Python Python | =3.11.0-alpha6 | |
Microsoft Windows | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp ONTAP Select Deploy administration utility |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26488 is a vulnerability in Python before 3.10.3 on Windows that allows local users to gain privileges due to inadequate security in the search path.
CVE-2022-26488 affects Python versions before 3.10.3 on Windows.
CVE-2022-26488 has a severity rating of high.
To exploit CVE-2022-26488, a local attacker must have installed Python for all users and enabled user-writable directories.
Yes, you can find references for CVE-2022-26488 at the following links: [link1](https://mail.python.org/archives/list/security-announce@python.org/thread/657Z4XULWZNIY5FRP3OWXHYKUSIH6DMN/) and [link2](https://security.netapp.com/advisory/ntap-20220419-0005/).