First published: Wed Aug 23 2023(Updated: )
An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Python | >=3.11.0<=3.11.4 | |
redhat/Pyhton | <3.11.5 | 3.11.5 |
Netapp Active Iq Unified Manager Windows | ||
debian/python2.7 | 2.7.18-8+deb11u1 | |
debian/python3.11 | 3.11.2-6+deb12u4 3.11.2-6+deb12u3 | |
debian/python3.12 | 3.12.7-3 | |
debian/python3.9 | 3.9.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41105 is a vulnerability in Python 3.11 through 3.11.4 that allows a path containing '\0' bytes to be truncated unexpectedly at the first '\0' byte.
CVE-2023-41105 affects Python versions 3.11 through 3.11.4.
CVE-2023-41105 has a severity rating of 7.5 out of 10.
CVE-2023-41105 can be exploited by passing a path containing '\0' bytes to the os.path.normpath() function in Python.
Yes, patches are available for Python versions 3.11 through 3.11.4 to address CVE-2023-41105.