CVE-2024-47532Sensitive Information Exposure in Restrictedpython

Severity
8.7HIGHNVD
OSV9.9
EPSS
0.8%
top 25.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 30
Latest updateMar 18

Description

RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Packages6 packages

debiandebian/restrictedpython< restrictedpython 8.0-1 (forky)

Patches

🔴Vulnerability Details

4
OSV
restrictedpython vulnerabilities2025-03-18
OSV
RestrictedPython information leakage via `AttributeError.obj` and the `string` module2024-09-30
OSV
CVE-2024-47532: RestrictedPython is a restricted execution environment for Python to run untrusted code2024-09-30
GHSA
RestrictedPython information leakage via `AttributeError.obj` and the `string` module2024-09-30

📋Vendor Advisories

2
Ubuntu
RestrictedPython vulnerabilities2025-03-18
Debian
CVE-2024-47532: restrictedpython - RestrictedPython is a restricted execution environment for Python to run untrust...2024