First published: Fri May 03 2024(Updated: )
### Impact Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. Example: ```sh python -m tqdm --manpath="\" + str(exec(\"import os\nos.system('echo hi && killall python3')\")) + \"" ``` ### Patches https://github.com/tqdm/tqdm/commit/4e613f84ed2ae029559f539464df83fa91feb316 released in `tqdm>=4.66.3` ### Workarounds None ### References - https://github.com/tqdm/tqdm/releases/tag/v4.66.3
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/tqdm | >=4.4.0<4.66.3 | 4.66.3 |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.22.0 | |
debian/tqdm | <=4.57.0-2<=4.64.1-1 | 4.67.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34062 has a high severity rating due to the potential for arbitrary code execution via non-boolean CLI arguments.
To fix CVE-2024-34062, upgrade to tqdm version 4.66.3 or later.
CVE-2024-34062 affects versions of tqdm from 4.4.0 to 4.66.3, as well as specific versions of IBM Cloud Pak for Security and QRadar Suite Software.
There are no known effective workarounds for CVE-2024-34062; the best solution is to upgrade to a secured version.
CVE-2024-34062 is classified as a code injection vulnerability, enabling arbitrary code execution through manipulated CLI arguments.