Описание
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-apps/xenial | not-affected | 0.3.8-2 |
| esm-infra-legacy/trusty | not-affected | 0.3.6-1 |
| lucid | DNE | |
| precise | DNE | |
| quantal | ignored | end of life |
| saucy | ignored | end of life |
| trusty | not-affected | 0.3.6-1 |
| trusty/esm | not-affected | 0.3.6-1 |
| upstream | released | 0.3.6-1 |
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
The shell_quote function in python-gnupg 0.3.5 does not properly escap ...
python-gnupg's shell_quote function does not properly escape characters
EPSS
4.6 Medium
CVSS2