Описание
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-apps/xenial | not-affected | |
| esm-infra-legacy/trusty | released | 0.3.6-1 |
| lucid | DNE | |
| precise | DNE | |
| quantal | ignored | end of life |
| saucy | ignored | end of life |
| trusty | released | 0.3.6-1 |
| trusty/esm | released | 0.3.6-1 |
| upstream | released | 0.3.6-1 |
Показывать по
7.5 High
CVSS2
Связанные уязвимости
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
The shell_quote function in python-gnupg 0.3.5 does not properly quote ...
python-gnupg's shell_quote function does not properly quote strings
7.5 High
CVSS2