CVE-2023-41039Injection in Restrictedpython

CWE-74Injection7 documents5 sources
Severity
7.7HIGHNVD
OSV9.9
EPSS
0.1%
top 74.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 30
Latest updateMar 18

Description

RestrictedPython is a restricted execution environment for Python to run untrusted code. Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure. With `RestrictedPython`, the format functionality is available via the `format` and `format_map` methods of `str` (and `unicode`) (accessed either via the class or its ins

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 3.1 | Impact: 4.0

Affected Packages6 packages

NVDzope/restrictedpython6.06.2+1
debiandebian/restrictedpython< restrictedpython 6.2-1 (forky)

Patches

🔴Vulnerability Details

4
OSV
restrictedpython vulnerabilities2025-03-18
OSV
Sandbox escape via various forms of "format".2023-08-30
OSV
CVE-2023-41039: RestrictedPython is a restricted execution environment for Python to run untrusted code2023-08-30
GHSA
Sandbox escape via various forms of "format".2023-08-30

📋Vendor Advisories

2
Ubuntu
RestrictedPython vulnerabilities2025-03-18
Debian
CVE-2023-41039: restrictedpython - RestrictedPython is a restricted execution environment for Python to run untrust...2023