Vulnerability Description
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Python | Python | >= 2.0, < 2.7.17 |
| Opensuse | Leap | 15.0 |
| Debian | Debian Linux | 8.0 |
| Fedoraproject | Fedora | 29 |
| Canonical | Ubuntu Linux | 12.04 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Eus | 8.1 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Eus | 8.4 |
| Redhat | Enterprise Linux Tus | 8.2 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.htmlMailing ListThird Party Advisory
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-UThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/107549Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:1700Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2030Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3335Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:3520Third Party Advisory
- https://bugs.python.org/issue35907ExploitIssue TrackingVendor Advisory
- https://github.com/python/cpython/pull/11842PatchThird Party Advisory
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab
- https://lists.debian.org/debian-lts-announce/2019/06/msg00022.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/07/msg00011.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/08/msg00034.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2019-9948?
CVE-2019-9948 is a vulnerability with a CVSS score of 9.1 (CRITICAL). urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering...
How severe is CVE-2019-9948?
CVE-2019-9948 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-9948?
Check the references section above for vendor advisories and patch information. Affected products include: Python Python, Opensuse Leap, Debian Debian Linux, Fedoraproject Fedora, Canonical Ubuntu Linux.