#VU95157 Incorrect provision of specified functionality in Python


Published: 2024-08-02

Vulnerability identifier: #VU95157

Vulnerability risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-4032

CWE-ID: CWE-684

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Python
Universal components / Libraries / Scripting languages

Vendor: Python.org

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists within the "ipaddress" module that contains incorrect information and private and public IP addresses for IPv4 and IPv6 protocols. This affects the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes. A remote attacker can bypass implemented security restrictions based on IP addresses or perform other actions, depending on the application's capabilities.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Python: 3.12.0 - 3.12.3, 3.11.0 - 3.11.8, 3.10.0 - 3.10.14, 3.9.0 - 3.9.19, 3.8 - 3.8.19


External links
http://github.com/python/cpython/issues/113171
http://github.com/python/cpython/pull/113179
http://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
http://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml
http://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
http://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
http://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
http://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
http://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
http://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
http://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
http://www.openwall.com/lists/oss-security/2024/06/17/3
http://security.netapp.com/advisory/ntap-20240726-0004/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability