Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-050EBA46-7638-11ED-820D-080027D3A315: Python -- multiple vulnerabilities

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-050EBA46-7638-11ED-820D-080027D3A315: Python -- multiple vulnerabilities



Python reports:

gh-100001: python -m http.server no longer allows terminal control characters sent

within a garbage request to be printed to the stderr server log.

This is done by changing the http.server BaseHTTPRequestHandler .log_message method

to replace control characters with a \xHH hex escape before printing.

gh-87604: Avoid publishing list of active per-interpreter audit hooks via the gc module.

gh-98433: The IDNA codec decoder used on DNS hostnames by socket or asyncio related

name resolution functions no longer involves a quadratic algorithm. This prevents a

potential CPU denial of service if an out-of-spec excessive length hostname involving

bidirectional characters were decoded. Some protocols such as urllib http 3xx redirects

potentially allow for an attacker to supply such a name.

gh-98739: Update bundled libexpat to 2.5.0.

gh-97612: Fix a shell code injection vulnerability in the get-remote-certificate.py example

script. The script no longer uses a shell to run openssl commands. Issue reported and

initial fix by Caleb Shortt. Patch by Victor Stinner.


  • freebsd-upgrade-package-python310
  • freebsd-upgrade-package-python311
  • freebsd-upgrade-package-python37
  • freebsd-upgrade-package-python38
  • freebsd-upgrade-package-python39

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center