First published: Tue Feb 11 2025(Updated: )
A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Service Proxy for Kubernetes | >=1.7.0<=1.9.2 | |
F5 BIG-IP Next Cloud-Native Network Functions | >=1.1.0<=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000149756 is critical due to the potential for command injection vulnerabilities in the activation scripts.
To fix F5-K000149756, update to the latest version of the affected F5 products as indicated in the advisory.
F5-K000149756 affects F5 BIG-IP Next SPK versions from 1.7.0 to 1.9.2 and F5 BIG-IP Next CNF versions from 1.1.0 to 1.4.0.
If vulnerable to F5-K000149756, an attacker could exploit command injection to execute arbitrary commands in your environment.
Currently, there is no documented workaround for F5-K000149756, and upgrading is recommended to mitigate the risk.