CVE-2023-24816
February 10, 2023
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Versions prior to 8.1.0 are subject to a command injection vulnerability with very specific prerequisites. This vulnerability requires that the function "IPython.utils.terminal.set_term_title" be called on Windows in a Python environment where ctypes is not available. The dependency on "ctypes" in "IPython.utils._process_win32" prevents the vulnerable code from ever being reached in the ipython binary. However, as a library that could be used by another tool "set_term_title" could be called and hence introduce a vulnerability. Should an attacker get untrusted input to an instance of this function they would be able to inject shell commands as current process and limited to the scope of the current process. Users of ipython as a library are advised to upgrade. Users unable to upgrade should ensure that any calls to the "IPython.utils.terminal.set_term_title" function are done with trusted or filtered input.
Affected Packages
ipython (PYTHON):
Affected version(s) >=0.6.4 <8.10.0Fix Suggestion:
Update to version 8.10.0Related ResourcesĀ (10)
Do you need more information?
Contact UsCVSS v4
Base Score:
2
Attack Vector
LOCAL
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
PASSIVE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
LOW
Vulnerable System Availability
LOW
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
4.5
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW
Weakness Type (CWE)
EPSS
Base Score:
0.55