Qualys: Needrestart Zero-Day Vulnerability Allows Root Access with PYTHONPATH Manipulation

CVE-2024-48990

7.8HIGH

Key Information

Vendor
Needrestart
Status
Needrestart
Vendor
CVE Published:
19 November 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

Affected Version(s)

needrestart < 3.8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

Collectors

NVD DatabaseMitre Database8 Proof of Concept(s)

Credit

Qualys
Thomas Liske
Mark Esler
.