CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:python:python:3.14.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*

History

25 Apr 2025, 23:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250425-0006/ -

10 Feb 2025, 18:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Python python
Python
CPE cpe:2.3:a:python:python:3.14.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
CWE CWE-77
References () https://github.com/python/cpython/issues/124651 - () https://github.com/python/cpython/issues/124651 - Issue Tracking
References () https://github.com/python/cpython/pull/124712 - () https://github.com/python/cpython/pull/124712 - Issue Tracking, Patch
References () https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483 - () https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483 - Patch
References () https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ - () https://mail.python.org/archives/list/security-announce@python.org/thread/RSPJ2B5JL22FG3TKUJ7D7DQ4N5JRRBZL/ - Vendor Advisory
References () https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97 - () https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97 - Patch
References () https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db - () https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db - Patch
References () https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7 - () https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7 - Patch
References () https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b - () https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b - Patch
References () https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8 - () https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8 - Patch

31 Jan 2025, 20:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/d48cc82ed25e26b02eb97c6263d95dcaa1e9111b -

04 Nov 2024, 18:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/ae961ae94bf19c8f8c7fbea3d1c25cc55ce8ae97 -
  • () https://github.com/python/cpython/commit/8450b2482586857d689b6658f08de9c8179af7db -
  • () https://github.com/python/cpython/commit/9286ab3a107ea41bd3f3c3682ce2512692bdded8 -
  • () https://github.com/python/cpython/commit/633555735a023d3e4d92ba31da35b1205f9ecbd7 -

30 Oct 2024, 16:15

Type Values Removed Values Added
References
  • () https://github.com/python/cpython/commit/e52095a0c1005a87eed2276af7a1f2f66e2b6483 -

22 Oct 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-22 17:15

Updated : 2025-04-25 23:15


NVD link : CVE-2024-9287

Mitre link : CVE-2024-9287


JSON object : View

Products Affected

python

  • python
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')