CVE-2021-3426

NameCVE-2021-3426
DescriptionRunning `pydoc -p` allows other local users to extract arbitrary files. The `/getfile?key=path` URL allows to read arbitrary file on the filesystem.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2619-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python2.7 (PTS)stretch2.7.13-2+deb9u3fixed
stretch (security)2.7.13-2+deb9u5fixed
buster2.7.16-2+deb10u1fixed
bullseye, sid2.7.18-6fixed
python3.5 (PTS)stretch3.5.3-1+deb9u1vulnerable
stretch (security)3.5.3-1+deb9u4fixed
python3.7 (PTS)buster3.7.3-2+deb10u3vulnerable
python3.9 (PTS)bullseye, sid3.9.2-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python2.7source(unstable)(not affected)
python3.5sourcestretch3.5.3-1+deb9u4DLA-2619-1
python3.5source(unstable)(unfixed)
python3.7source(unstable)(unfixed)
python3.9sourceexperimental3.9.3-1
python3.9source(unstable)(unfixed)

Notes

[bullseye] - python3.9 <no-dsa> (Minor issue)
[buster] - python3.7 <no-dsa> (Minor issue)
- python2.7 <not-affected> (Vulnerable code not present)
https://bugs.python.org/issue42988
https://github.com/python/cpython/commit/9b999479c0022edfc9835a8a1f06e046f3881048
https://python-security.readthedocs.io/vuln/pydoc-getfile.html
https://github.com/python/cpython/pull/24337
https://github.com/python/cpython/pull/24285

Search for package or bug name: Reporting problems