pyenv 1.2.24 through 2.3.2 allows local users to gain...
High severity
Unreviewed
Published
Jul 18, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jul 17, 2022
Published to the GitHub Advisory Database
Jul 18, 2022
Last updated
Jan 27, 2023
pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.)
References