Vulnerability Details CVE-2022-35861
pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version. Thus, relative path traversal can occur.)
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.3%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 4.6
Products affected by CVE-2022-35861
-
cpe:2.3:a:pyenv:pyenv:1.2.24
-
cpe:2.3:a:pyenv:pyenv:1.2.24.1
-
cpe:2.3:a:pyenv:pyenv:1.2.25
-
cpe:2.3:a:pyenv:pyenv:1.2.26
-
cpe:2.3:a:pyenv:pyenv:1.2.27
-
cpe:2.3:a:pyenv:pyenv:2.0.0
-
cpe:2.3:a:pyenv:pyenv:2.0.1
-
cpe:2.3:a:pyenv:pyenv:2.0.2
-
cpe:2.3:a:pyenv:pyenv:2.0.3
-
cpe:2.3:a:pyenv:pyenv:2.0.4
-
cpe:2.3:a:pyenv:pyenv:2.0.5
-
cpe:2.3:a:pyenv:pyenv:2.0.6
-
cpe:2.3:a:pyenv:pyenv:2.0.7
-
cpe:2.3:a:pyenv:pyenv:2.1.0
-
cpe:2.3:a:pyenv:pyenv:2.2.0
-
cpe:2.3:a:pyenv:pyenv:2.2.1
-
cpe:2.3:a:pyenv:pyenv:2.2.2
-
cpe:2.3:a:pyenv:pyenv:2.2.3
-
cpe:2.3:a:pyenv:pyenv:2.2.4
-
cpe:2.3:a:pyenv:pyenv:2.2.4-1
-
cpe:2.3:a:pyenv:pyenv:2.2.5
-
cpe:2.3:a:pyenv:pyenv:2.3.0
-
cpe:2.3:a:pyenv:pyenv:2.3.1
-
cpe:2.3:a:pyenv:pyenv:2.3.2