Description
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
Remediation
References
Related Vulnerabilities
WordPress Plugin Ecommerce-Two Factor Authentication Cross-Site Scripting (1.0.4)
Collabtive Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2010-5285)
SharePoint Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-24955)