Search for vulnerabilities
Vulnerability details: VCID-1zqs-cabz-23ep
Vulnerability ID VCID-1zqs-cabz-23ep
Aliases CVE-2024-8088
Summary There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8088.json
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00038 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00042 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00046 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00068 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00071 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00077 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00077 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00077 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00077 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00077 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00077 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00083 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00087 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00092 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00092 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00092 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
epss 0.00133 https://api.first.org/data/v1/epss?cve=CVE-2024-8088
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8088.json
https://api.first.org/data/v1/epss?cve=CVE-2024-8088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798
https://github.com/python/cpython/issues/122905
https://github.com/python/cpython/issues/123270
https://github.com/python/cpython/pull/122906
https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/
https://security.netapp.com/advisory/ntap-20241011-0010/
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
2307370 https://bugzilla.redhat.com/show_bug.cgi?id=2307370
CVE-2024-8088 https://nvd.nist.gov/vuln/detail/CVE-2024-8088
RHSA-2024:5962 https://access.redhat.com/errata/RHSA-2024:5962
RHSA-2024:6163 https://access.redhat.com/errata/RHSA-2024:6163
RHSA-2024:6961 https://access.redhat.com/errata/RHSA-2024:6961
RHSA-2024:6962 https://access.redhat.com/errata/RHSA-2024:6962
RHSA-2024:9190 https://access.redhat.com/errata/RHSA-2024:9190
RHSA-2024:9192 https://access.redhat.com/errata/RHSA-2024:9192
RHSA-2024:9371 https://access.redhat.com/errata/RHSA-2024:9371
USN-7015-1 https://usn.ubuntu.com/7015-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8088.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.08289
EPSS Score 0.00038
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2024-09-17T19:12:31.918112+00:00 NVD Importer Import https://nvd.nist.gov/vuln/detail/CVE-2024-8088 34.0.1