user/py3-virtualenv: CVE-2018-17793: "sandbox" escape
Bugzilla ID | 110 |
Alias(es) | CVE-2018-17793 |
Reporter | Max Rees (sroracle) |
Assignee | Max Rees (sroracle) |
Reported | 2019-07-24 12:55:09 -0500 |
Modified | 2019-07-24 12:56:08 -0500 |
Status | RESOLVED NOTABUG |
Version | 1.0-BETA3 |
Hardware | Adélie Linux / All |
Importance | --- / normal |
URL | https://nvd.nist.gov/vuln/detail/CVE-2018-17793 |
Description
"POC" [1] says it all:
root@kali:
#pip install virtualenv#virtualenv test_env
root@kali:
root@kali:#cd test_env//test_env#source ./bin/activate
root@kali:
(test_env) root@kali:/test_env#/test_env#python $(bash >&2)2、Sandbox escape
(test_env) root@kali:
root@kali:#/test_env#python $(rbash >&2)
(test_env) root@kali:
root@kali:~#
This is NOTABUG, virtualenv is not a real sandbox.