Bypass access control vulnerability in Python - CVE-2021-29921ID: oval:org.secpod.oval:def:87742 | Date: (C)2023-02-27 (M)2023-12-04 |
Class: VULNERABILITY | Family: windows |
The host is installed with Python 3.8.x before 3.8.12, 3.9.x before 3.9.5 and is prone to a bypass access control vulnerability. A flaw is present in ipaddress library, which fails to properly handle leading zero characters in the octets of an IP address string. Successful exploitation allows attackers to bypass access control that is based on IP addresses.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Microsoft Windows 7 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |