In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.7.12"
},
{
"introduced": "3.8.0"
},
{
"last_affected": "3.8.12"
},
{
"introduced": "3.9.0"
},
{
"last_affected": "3.9.10"
},
{
"introduced": "3.10.0"
},
{
"last_affected": "3.10.2"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26488.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11.0-alpha1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11.0-alpha2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11.0-alpha3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11.0-alpha4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11.0-alpha5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11.0-alpha6"
}
]
}
]