Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2024-48990 — Uncontrolled Search Path Element in Needrestart
Severity
7.8HIGHNVD
EPSS
15.2%
top 5.37%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 19
Latest updateDec 5
Description
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
1📋Vendor Advisories
4🕵️Threat Intelligence
5Bleepingcomputer
▶
Qualys
▶