CVE-2020-27619 — Eval Injection in Python
Severity
9.8CRITICALNVD
EPSS
0.6%
top 29.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 22
Latest updateJul 11
Description
In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages4 packages
Also affects: Fedora 33, 34
Patches
🔴Vulnerability Details
7📋Vendor Advisories
7Microsoft▶
In Python 3 through 3.9.0 the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.↗2020-10-13
💬Community
8Bugzilla▶
CVE-2020-27619 python36: python: Python 3 eval of http resources during test suite runs [fedora-all]↗2020-10-21
Bugzilla▶
CVE-2020-27619 python39: python: Python 3 eval of http resources during test suite runs [fedora-all]↗2020-10-21
Bugzilla▶
CVE-2020-27619 python35: python: Python 3 eval of http resources during test suite runs [fedora-all]↗2020-10-21
Bugzilla▶
CVE-2020-27619 python37: python: Python 3 eval of http resources during test suite runs [fedora-all]↗2020-10-21
Bugzilla▶
CVE-2020-27619 python38: python: Python 3 eval of http resources during test suite runs [fedora-all]↗2020-10-21