Skip to main content
Version: latest

CVE-2022-0391

CVE Details

Visit the official vulnerability details page for CVE-2022-0391 to learn more.

Initial Publication

11/13/2024

Last Update

12/12/2024

Third Party Dependency

libpython2.7-minimal

NIST CVE Summary

A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.

CVE Severity

7.5

Our Official Summary

This flaw in urllib.parse module can cause injection attacks with crafted input. There are no known instances of the third party containers in which this cve is reported, affected in any way.

Containers where this vulnerability is reported do not allow execution of arbitrary code and this cannot be exploited through remote execution. Even then risk of exploitation is low since containers restrict the attack surface.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.4.20✅ No Impact✅ No Impact⚠️ Impacted⚠️ Impacted

Revision History

DateRevision
12/12/2024Official summary revised: This flaw in urllib.parse module can cause injection attacks with crafted input. There are no known instances of the third party containers in which this cve is reported, affected in any way.Containers where this vulnerability is reported do not allow execution of arbitrary code and this cannot be exploited through remote execution. Even then risk of exploitation is low since containers restrict the attack surface.