CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.14.0:alpha1:*:*:*:*:*:*

History

10 Feb 2025, 18:47

Type Values Removed Values Added
References () https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7 - () https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7 - Patch
References () https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db - () https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db - Patch
References () https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8 - () https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8 - Patch
References () https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97 - () https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97 - Patch
References () https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b - () https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b - Patch
References () https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483 - () https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483 - Patch
References () https://github.com/python/cpython/issues/124651 - () https://github.com/python/cpython/issues/124651 - Issue Tracking
References () https://github.com/python/cpython/pull/124712 - () https://github.com/python/cpython/pull/124712 - Issue Tracking, Patch
References () https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ - () https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ - Vendor Advisory
CPE cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:3.14.0:alpha1:*:*:*:*:*:*
First Time Python python
Python
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-77

31 Jan 2025, 20:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b -

Information

Published : 2024-10-22 17:15

Updated : 2025-02-10 18:47


NVD link : CVE-2024-9287

Mitre link : CVE-2024-9287

CVE.ORG link : CVE-2024-9287


JSON object : View

Products Affected

python

  • python
CWE
CWE-428

Unquoted Search Path or Element

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')