{
  "threat_severity" : "Important",
  "public_date" : "2024-11-24T00:00:00Z",
  "bugzilla" : {
    "description" : "virtualenv: potential command injection via virtual environment activation scripts",
    "id" : "2328554",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2328554"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-78",
  "details" : [ "virtualenv before 20.26.6 allows command injection through the activation scripts for a virtual environment. Magic template strings are not quoted correctly when replacing. NOTE: this is not the same as CVE-2024-9287.", "A flaw was found in the virtualenv Python package. Due to the improper handling of quotes in magic template strings, the virtual environment activation script is vulnerable to OS command injection,leading to the loss of confidentiality,integrity and availability of the system." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
    "release_date" : "2024-12-16T00:00:00Z",
    "advisory" : "RHSA-2024:11048",
    "cpe" : "cpe:/o:redhat:rhel_els:7",
    "package" : "python-virtualenv-0:15.1.0-7.el7_9.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2024-12-11T00:00:00Z",
    "advisory" : "RHSA-2024:10953",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "python36:3.6-8100020241203074044.4c5117ad"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support",
    "release_date" : "2024-12-16T00:00:00Z",
    "advisory" : "RHSA-2024:11091",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.2",
    "package" : "python36:3.6-8020020241213084804.606b8f18"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
    "release_date" : "2025-01-01T00:00:00Z",
    "advisory" : "RHSA-2025:0002",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.4",
    "package" : "python36:3.6-8040020241213073301.9bf6f064"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
    "release_date" : "2025-01-01T00:00:00Z",
    "advisory" : "RHSA-2025:0002",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.4",
    "package" : "python36:3.6-8040020241213073301.9bf6f064"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
    "release_date" : "2025-01-01T00:00:00Z",
    "advisory" : "RHSA-2025:0002",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.4",
    "package" : "python36:3.6-8040020241213073301.9bf6f064"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
    "release_date" : "2024-12-16T00:00:00Z",
    "advisory" : "RHSA-2024:11094",
    "cpe" : "cpe:/a:redhat:rhel_aus:8.6",
    "package" : "python36:3.6-8060020241213062726.448f2761"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
    "release_date" : "2024-12-16T00:00:00Z",
    "advisory" : "RHSA-2024:11094",
    "cpe" : "cpe:/a:redhat:rhel_tus:8.6",
    "package" : "python36:3.6-8060020241213062726.448f2761"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
    "release_date" : "2024-12-16T00:00:00Z",
    "advisory" : "RHSA-2024:11094",
    "cpe" : "cpe:/a:redhat:rhel_e4s:8.6",
    "package" : "python36:3.6-8060020241213062726.448f2761"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support",
    "release_date" : "2024-12-16T00:00:00Z",
    "advisory" : "RHSA-2024:11093",
    "cpe" : "cpe:/a:redhat:rhel_eus:8.8",
    "package" : "python36:3.6-8080020241205132428.075014fc"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces 3 Containers",
    "release_date" : "2025-02-03T00:00:00Z",
    "advisory" : "RHSA-2025:0892",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3::el9",
    "package" : "devspaces/udi-rhel9:3.18-1"
  } ],
  "package_state" : [ {
    "product_name" : "OpenShift Lightspeed",
    "fix_state" : "Affected",
    "package_name" : "openshift-lightspeed-tech-preview/lightspeed-service-api-rhel9",
    "cpe" : "cpe:/a:redhat:openshift_lightspeed"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Not affected",
    "package_name" : "python-virtualenv",
    "cpe" : "cpe:/a:redhat:openshift:4"
  }, {
    "product_name" : "Red Hat OpenShift Dev Spaces",
    "fix_state" : "Not affected",
    "package_name" : "devspaces/traefik-rhel8",
    "cpe" : "cpe:/a:redhat:openshift_devspaces:3"
  }, {
    "product_name" : "Red Hat Satellite 6",
    "fix_state" : "Not affected",
    "package_name" : "python-virtualenv",
    "cpe" : "cpe:/a:redhat:satellite:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-53899\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-53899\nhttps://github.com/pypa/virtualenv/issues/2768\nhttps://github.com/pypa/virtualenv/pull/2771\nhttps://github.com/pypa/virtualenv/releases/tag/20.26.6" ],
  "name" : "CVE-2024-53899",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}