- Description
- Multiple untrusted search path vulnerabilities in Portage before 2.1.4.5 include the current working directory in the Python search path, which allows local users to execute arbitrary code via a modified Python module that is loaded by the (1) ys-apps/portage, (2) net-mail/fetchmail, (3) app-editors/leo ebuilds, and other ebuilds.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gentoo:portage:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DF07C844-F3BF-4B64-9067-019011E752E0",
"versionEndIncluding": "2.1.4.4"
},
{
"criteria": "cpe:2.3:a:gentoo:portage:2.0.51.22:r3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B1A333DF-BC3A-4DDE-A5E3-41FF1EBD78A4"
},
{
"criteria": "cpe:2.3:a:gentoo:portage:2.1.1:r2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A8469FBB-223E-43B5-8708-B984E72A683F"
},
{
"criteria": "cpe:2.3:a:gentoo:portage:2.1.3.10:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F663C7AD-8AEF-4C78-A501-FC72C49F9ADE"
},
{
"criteria": "cpe:2.3:a:gentoo:portage:2.1.3.11:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4CA86E5F-4496-4485-99B7-24BB4EDEEAE0"
}
],
"operator": "OR"
}
]
}
]