Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-12761

Опубликовано: 01 июн. 2019
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.

Отчет

This issue have a Moderate security impact and affects pyxdg version as shipped with Red Hat Enterprise Linux 6 and 8. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6pyxdgOut of support scope
Red Hat Enterprise Linux 8pyxdgWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1718204pyxdg: code injection via crafted python code

EPSS

Процентиль: 70%
0.00645
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.

CVSS3: 7.5
nvd
больше 6 лет назад

A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.

CVSS3: 7.5
debian
больше 6 лет назад

A code injection issue was discovered in PyXDG before 0.26 via crafted ...

suse-cvrf
больше 3 лет назад

Security update for python-pyxdg

CVSS3: 7.5
github
больше 6 лет назад

Code Injection in PyXDG

EPSS

Процентиль: 70%
0.00645
Низкий

6.1 Medium

CVSS3