CVE-2019-9948

high-risk
Published 2019-03-23

urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.

Do I need to act?

-
0.96% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10 Critical
NETWORK / LOW complexity

References (44)

and 24 more references
55
/ 100
high-risk
Severity 31/34 · Critical
Exploitability 3/34 · Minimal
Exposure 21/34 · High