Sandbox escape via various forms of "format".
High severity
GitHub Reviewed
Published
Aug 30, 2023
in
zopefoundation/RestrictedPython
•
Updated Nov 7, 2023
Description
Published by the National Vulnerability Database
Aug 30, 2023
Published to the GitHub Advisory Database
Aug 30, 2023
Reviewed
Aug 30, 2023
Last updated
Nov 7, 2023
Impact
Python's "format" functionality allows someone controlling the format string to "read" all objects accessible through recursive attribute lookup and subscription from objects he can access. This can lead to critical information disclosure.
With
RestrictedPython
, the format functionality is available via theformat
andformat_map
methods ofstr
(andunicode
) (accessed either via the class or its instances) and viastring.Formatter
.All known versions of
RestrictedPython
are vulnerable.Patches
The issue will be fixed in 5.4 and 6.2.
Workarounds
There are no workarounds to fix the issue without upgrading.
References
For more information
If you have any questions or comments about this advisory:
Credits
Thanks for analysing and reporting the go to:
References