Описание
python-gnupg vulnerable to shell injection
python-gnupg 0.3.5 and 0.3.6 allow for shell injection via a failure to escape backslashes in the shell_quote() function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-1929
- https://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/2014-June/028512.html
- https://code.google.com/archive/p/python-gnupg/issues/98
- https://github.com/advisories/GHSA-vcr5-xr9h-mvc5
- https://github.com/pypa/advisory-database/tree/main/vulns/python-gnupg/PYSEC-2014-92.yaml
- https://web.archive.org/web/20200228170437/http://www.securityfocus.com/bid/65539
- https://www.openwall.com/lists/oss-security/2014/02/04/3
- https://www.openwall.com/lists/oss-security/2014/02/04/4
- http://seclists.org/oss-sec/2014/q1/245
- http://seclists.org/oss-sec/2014/q1/335
- http://www.debian.org/security/2014/dsa-2946
Пакеты
python-gnupg
>= 0.3.5, <= 0.3.6
0.3.7
Связанные уязвимости
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to hav ...