CVE-2020-15801 — Untrusted Search Path in Python
Severity
9.8CRITICALNVD
EPSS
0.6%
top 30.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 17
Latest updateDec 14
Description
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The ._pth file (e.g., the python._pth file) is not affected.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
1📋Vendor Advisories
3💬Community
13Bugzilla▶
CVE-2020-15801 python34: python: sys.path allowing code to be loaded from arbitrary locations [epel-all]↗2020-07-24
Bugzilla▶
CVE-2020-15801 python3: python: sys.path allowing code to be loaded from arbitrary locations [fedora-all]↗2020-07-24
Bugzilla▶
CVE-2020-15801 python36: python: sys.path allowing code to be loaded from arbitrary locations [fedora-all]↗2020-07-24
Bugzilla▶
CVE-2020-15801 python38: python: sys.path allowing code to be loaded from arbitrary locations [fedora-all]↗2020-07-24
Bugzilla
▶