CVE Vulnerabilities

CVE-2024-34062

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: May 03, 2024 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.3 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. --delim, --buf-size, --manpath) are passed through pythons eval, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Tqdm Ubuntu esm-apps/jammy *
Tqdm Ubuntu esm-apps/noble *
Tqdm Ubuntu jammy *
Tqdm Ubuntu noble *
Tqdm Ubuntu upstream *

Potential Mitigations

References