CVE-2023-41105

An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
Configurations

Configuration 1 (hide)

cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*

History

21 Nov 2024, 08:20

Type Values Removed Values Added
References () https://github.com/python/cpython/issues/106242 - Issue Tracking, Patch () https://github.com/python/cpython/issues/106242 - Issue Tracking, Patch
References () https://github.com/python/cpython/pull/107981 - Patch () https://github.com/python/cpython/pull/107981 - Patch
References () https://github.com/python/cpython/pull/107982 - Patch () https://github.com/python/cpython/pull/107982 - Patch
References () https://github.com/python/cpython/pull/107983 - Patch () https://github.com/python/cpython/pull/107983 - Patch
References () https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/ - () https://mail.python.org/archives/list/security-announce%40python.org/thread/D6CDW3ZZC5D444YGL3VQUY6D4ECMCQLD/ -
References () https://security.netapp.com/advisory/ntap-20231006-0015/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20231006-0015/ - Third Party Advisory

Information

Published : 2023-08-23 07:15

Updated : 2024-11-21 08:20


NVD link : CVE-2023-41105

Mitre link : CVE-2023-41105

CVE.ORG link : CVE-2023-41105


JSON object : View

Products Affected

python

  • python

netapp

  • active_iq_unified_manager
CWE
CWE-426

Untrusted Search Path