Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26488

EPSS 1.35% · P80
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-26488

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Python 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Python是Python基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。urllib是其中的一个用于处理URL的模块。 Python 存在安全漏洞,该漏洞源于Python Core 缺少权限的限制。攻击者利用该漏洞可以通过Windows安装程序绕过Python Core的限制,以进行特权提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-26488

#POC DescriptionSource LinkShenlong Link
1POC Exploit for CVE-2022-26488 - Python for Windows (CPython) escalation of privilege vulnerability, discovered by the Lockheed Martin Red Team.https://github.com/techspence/PyPATHPwnerPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-26488

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-03-07 · 46 CVEs total

CVE-2022-25217Phicomm 多款产品信任管理问题漏洞
CVE-2022-25213Phicomm 多款产品信任管理问题漏洞
CVE-2022-25219Phicomm 多款产品安全漏洞
CVE-2021-34340Ming 缓冲区错误漏洞
CVE-2021-34339Ming 缓冲区错误漏洞
CVE-2021-34338Ming 缓冲区错误漏洞
CVE-2022-26662Tryton 安全漏洞
CVE-2022-26661Tryton 代码问题漏洞
CVE-2021-34341Ming 缓冲区错误漏洞
CVE-2022-25218多款PHICOMM产品加密问题漏洞
CVE-2022-25215Phicomm多款产品安全漏洞
CVE-2022-25214Phicomm多款产品安全漏洞
CVE-2022-25243HashiCorp Vault 信任管理问题漏洞
CVE-2022-25244HashiCorp Vault 安全漏洞
CVE-2020-36517Home Assistant 安全漏洞
CVE-2021-41657SmartBear CodeCollaborator 输入验证错误漏洞
CVE-2021-43970Quicklert 代码问题漏洞
CVE-2021-43969Quicklert SQL注入漏洞
CVE-2022-22834OverIT Geocall 安全漏洞
CVE-2022-22835OverIT Geocall 代码问题漏洞

Showing top 20 of 46 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-26488

No comments yet


Leave a comment