First published: Thu Feb 20 2025(Updated: )
It was discovered that Python incorrectly handled parsing domain names that included square brackets. A remote attacker could possibly use this issue to perform a Server-Side Request Forgery (SSRF) attack.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3.12 | <3.12.7-1ubuntu2 | 3.12.7-1ubuntu2 |
Xfce Application Finder | =24.10 | |
All of | ||
ubuntu/python3.12-minimal | <3.12.7-1ubuntu2 | 3.12.7-1ubuntu2 |
Xfce Application Finder | =24.10 | |
All of | ||
ubuntu/python3.12 | <3.12.3-1ubuntu0.5 | 3.12.3-1ubuntu0.5 |
Xfce Application Finder | =24.04 | |
All of | ||
ubuntu/python3.12-minimal | <3.12.3-1ubuntu0.5 | 3.12.3-1ubuntu0.5 |
Xfce Application Finder | =24.04 | |
All of | ||
ubuntu/python3.10 | <3.10.12-1~22.04.9 | 3.10.12-1~22.04.9 |
Xfce Application Finder | =22.04 | |
All of | ||
ubuntu/python3.10-minimal | <3.10.12-1~22.04.9 | 3.10.12-1~22.04.9 |
Xfce Application Finder | =22.04 | |
All of | ||
ubuntu/python3.8 | <3.8.10-0ubuntu1~20.04.15 | 3.8.10-0ubuntu1~20.04.15 |
Xfce Application Finder | =20.04 | |
All of | ||
ubuntu/python3.8-minimal | <3.8.10-0ubuntu1~20.04.15 | 3.8.10-0ubuntu1~20.04.15 |
Xfce Application Finder | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7280-1 describes a flaw in Python's handling of domain name parsing that may allow remote attackers to conduct Server-Side Request Forgery (SSRF) attacks.
The severity of USN-7280-1 is considered critical due to the potential for SSRF attacks.
To fix USN-7280-1, users should update Python to versions 3.12.7-1ubuntu2, 3.10.12-1~22.04.9, or 3.8.10-0ubuntu1~20.04.15 depending on their Ubuntu version.
USN-7280-1 affects Ubuntu versions 20.04, 22.04, and 24.10.
Failure to address USN-7280-1 could result in exploited SSRF vulnerabilities leading to unauthorized access or manipulation of internal resources.