7.5 CVE-2024-4032

RCE Injection SQL Buffer Overflow
 

The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
https://nvd.nist.gov/vuln/detail/CVE-2024-4032

Categories

CWE-697 : Incorrect Comparison
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses. Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390) Chain: Proxy uses a substring search instead of parsing the Transfer-Encoding header (CWE-697), allowing request splitting (CWE-113) and cache poisoning Proxy performs incorrect comparison of request headers, leading to infoleak

References

af854a3a-2127-422b-91ae-364da2661108

http://www.openwall.com/lists/oss-security/2024/06/17/3
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16...
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7...
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea...
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a3...
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b65...
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252...
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://mail.python.org/archives/list/security-announce@python.org/thread/NRU...
https://security.netapp.com/advisory/ntap-20240726-0004/
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special...
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special...

cna@python.org

http://www.openwall.com/lists/oss-security/2024/06/17/3
https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16...
https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7...
https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea...
https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a3...
https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b65...
https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252...
https://github.com/python/cpython/issues/113171
https://github.com/python/cpython/pull/113179
https://mail.python.org/archives/list/security-announce@python.org/thread/NRU...
https://security.netapp.com/advisory/ntap-20240726-0004/
https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special...
https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special...


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
10 Buffer Overflow via Environment Variables
High
120 Double Encoding
Medium
14 Client-side Injection-induced Buffer Overflow
High
15 Command Delimiters
High
182 Flash Injection
Medium
24 Filter Failure through Buffer Overflow
High
267 Leverage Alternate Encoding
High
3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
Medium
41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
High
43 Exploiting Multiple Input Interpretation Layers
High
44 Overflow Binary Resource File
Very High
45 Buffer Overflow via Symbolic Links
High
46 Overflow Variables and Tags
High
47 Buffer Overflow via Parameter Expansion
High
52 Embedding NULL Bytes
High
53 Postfix, Null Terminate, and Backslash
High
6 Argument Injection
High
64 Using Slashes and URL Encoding Combined to Bypass Validation Logic
High
67 String Format Overflow in syslog()
Very High
7 Blind SQL Injection
High
71 Using Unicode Encoding to Bypass Validation Logic
High
73 User-Controlled Filename
High
78 Using Escaped Slashes in Alternate Encoding
High
79 Using Slashes in Alternate Encoding
High
8 Buffer Overflow in an API Call
High
80 Using UTF-8 Encoding to Bypass Validation Logic
High
88 OS Command Injection
High
9 Buffer Overflow in Local Command-Line Utilities
High
92 Forced Integer Overflow
High


MITRE


Techniques

id description
T1027 Obfuscated Files or Information
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1017 Ensure that a finite amount of ingress points to a software deployment system exist with restricted access for those required to allow and enable newly deployed software.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.