CVE-2022-21797Code Injection in Project Joblib

CWE-94Code Injection9 documents7 sources
Severity
9.8CRITICALNVD
EPSS
0.3%
top 49.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 26
Latest updateSep 3

Description

The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/joblib< joblib 1.2.0-1 (bookworm)
CVEListV5joblib_project/joblibunspecified1.2.0+1
PyPIjoblib_project/joblib< 1.2.0
Debianjoblib_project/joblib< 0.17.0-4+deb11u1+3

Also affects: Debian Linux 10.0, Fedora 36, 37

Patches

🔴Vulnerability Details

3
OSV
joblib vulnerable to arbitrary code execution2022-09-27
GHSA
joblib vulnerable to arbitrary code execution2022-09-27
OSV
CVE-2022-21797: The package joblib from 0 and before 12022-09-26

📋Vendor Advisories

2
Oracle
Oracle Oracle Analytics Risk Matrix: Pipeline Test Failures (Joblib) — CVE-2022-217972024-07-15
Debian
CVE-2022-21797: joblib - The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Exec...2022

🕵️Threat Intelligence

2
Qualys
Oracle Critical Patch Update, July 2024 Security Update Review2024-07-17
Qualys
Oracle Critical Patch Security Update: July 2024 Review | Qualys2024-07-17

📄Research Papers

1
arXiv
VulnRepairEval: An Exploit-Based Evaluation Framework for Assessing Large Language Model Vulnerability Repair Capabilities2025-09-03
CVE-2022-21797 — Code Injection in Project Joblib | cvebase