漏洞信息详情
Python urllib 路径遍历漏洞
漏洞简介
Python是Python软件基金会的一套开源的、面向对象的程序设计语言。该语言具有可扩展、支持模块和包、支持多种平台等特点。urllib是其中的一个用于处理URL的模块。
Python 2.x版本至2.7.16版本中的urllib存在路径遍历漏洞,该漏洞源于程序支持local_file: scheme。远程攻击者可利用该漏洞绕过保护机制。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://bugs.python.org/issue35907
参考网址
来源:BID
链接:https://www.securityfocus.com/bid/107549
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/
来源:GENTOO
链接:https://security.gentoo.org/glsa/202003-26
来源:MLIST
链接:https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1700
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/07/msg00011.html
来源:MISC
链接:https://bugs.python.org/issue35907
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/
来源:github.com
链接:https://github.com/python/cpython/pull/11842
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3520
来源:UBUNTU
链接:https://usn.ubuntu.com/4127-1/
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2030
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3335
来源:UBUNTU
链接:https://usn.ubuntu.com/4127-2/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Oct/29
来源:BID
链接:http://www.securityfocus.com/bid/107549
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20190404-0004/
来源:MISC
链接:https://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20191439-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20190972-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914018-1.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1284616
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1284292
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1167892
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:1700
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1115643
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1115649
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1116357
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4479/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157141/Red-Hat-Security-Advisory-2020-1346-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2421/
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107549
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-all-python-publicly-disclosed-vulnerability/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Python-urllib-file-reading-via-Blacklist-Bypass-28848
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/79430
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/79110
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1281/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1167106
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1174/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1243/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4479.2/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156748/Gentoo-Linux-Security-Advisory-202003-26.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157222/Red-Hat-Security-Advisory-2020-1462-01.html
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-resilient-is-vulnerable-to-using-python-component-with-known-vulnerabilities-in-rhel-7-4/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2489/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2287/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1115655
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0343/
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1146574
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9948
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.1353.2/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-python-affect-ibm-operations-analytics-predictive-insights-cve-2019-9948-cve-2019-9947/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1341/
受影响实体
暂无
补丁
- Python urllib 安全漏洞的修复措施<!--2019-3-23-->
还没有评论,来说两句吧...