First published: Mon Jan 26 2009(Updated: )
Untrusted search path vulnerability in the Python module of xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function. References (test case, PoC): <a href="http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html">http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html</a> Proposed patch: The Debian patch for similar dia's Python related issue, available at: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=pythonpath.diff;att=1;bug=504251</a> should be sufficient to resolve this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
XChat | ||
CPython |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-481560 is considered high due to the potential for arbitrary code execution by local users.
To fix REDHAT-BUG-481560, ensure that your Python version and XChat are updated to the latest patches that address this vulnerability.
Local users running vulnerable versions of the XChat application and the Python module are affected by REDHAT-BUG-481560.
The REDHAT-BUG-481560 vulnerability is caused by an untrusted search path, allowing execution of malicious Python files through improper handling of sys.path.
Yes, there are reported test cases and proof-of-concept exploits demonstrating the REDHAT-BUG-481560 vulnerability in the wild.