CVE-2022-0391
CVE Details
Visit the official vulnerability details page for CVE-2022-0391 to learn more.
Initial Publication
11/13/2024
Last Update
12/12/2024
Third Party Dependency
libpython2.7-minimal
NIST CVE Summary
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
CVE Severity
Our Official Summary
This flaw in urllib.parse module can cause injection attacks with crafted input. There are no known instances of the third party containers in which this cve is reported, affected in any way.
Containers where this vulnerability is reported do not allow execution of arbitrary code and this cannot be exploited through remote execution. Even then risk of exploitation is low since containers restrict the attack surface.
Status
Ongoing
Affected Products & Versions
Version | Palette Enterprise | Palette Enterprise Airgap | VerteX | VerteX Airgap |
---|---|---|---|---|
4.4.20 | ✅ No Impact | ✅ No Impact | ⚠️ Impacted | ⚠️ Impacted |
Revision History
Date | Revision |
---|---|
12/12/2024 | Official summary revised: This flaw in urllib.parse module can cause injection attacks with crafted input. There are no known instances of the third party containers in which this cve is reported, affected in any way.Containers where this vulnerability is reported do not allow execution of arbitrary code and this cannot be exploited through remote execution. Even then risk of exploitation is low since containers restrict the attack surface. |