Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-17522

Опубликовано: 14 дек. 2017
Источник: debian

Описание

Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jythonunfixedpackage
jythonnot-affectedwheezypackage
python2.6removedpackage
python2.7unfixedpackage
python3.2removedpackage
python3.4removedpackage
python3.5removedpackage
python3.6removedpackage
python3.7removedpackage

Примечания

  • Lib/webbrowser.py does not validate strings before launching the program

  • specified by the BROWSER environment variable.

  • https://bugs.python.org/issue32367

  • Hardly an issue with security impact, as the problematic code further relies

  • on subprocess.Popen with the default shell=False.

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

** DISPUTED ** Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting.

CVSS3: 5.3
redhat
больше 7 лет назад

Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting

CVSS3: 8.8
nvd
больше 7 лет назад

Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting

CVSS3: 8.8
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 8.8
github
около 3 лет назад

** DISPUTED ** Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting.