First published: Mon Sep 30 2024(Updated: )
### Impact A user can gain access to protected (and potentially sensible) information indirectly via `AttributeError.obj` and the `string` module. ### Patches The problem will be fixed in version 7.3. ### Workarounds If the application does not require access to the module `string`, it can remove it from `RestrictedPython.Utilities.utility_builtins` or otherwise do not make it available in the restricted execution environment.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/RestrictedPython | <7.3 | 7.3 |
RestrictedPython | <7.3 |
https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2024-47532 vulnerability has been identified as having a significant impact as it allows unauthorized access to protected information.
You can fix CVE-2024-47532 by upgrading to version 7.3 of the RestrictedPython package.
CVE-2024-47532 affects the RestrictedPython package prior to version 7.3.
A temporary workaround for CVE-2024-47532 is to disable access to the string module if it is not required.
CVE-2024-47532 is caused by an AttributeError in the handling of the string module that exposes protected information.