Lucene search

K
githubGitHub Advisory DatabaseGHSA-R3VR-PRWV-86G9
HistoryNov 06, 2018 - 11:14 p.m.

High severity vulnerability that affects python-gnupg

2018-11-0623:14:39
CWE-20
GitHub Advisory Database
github.com
16

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.013

Percentile

86.1%

The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using β€œ$(” command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Affected configurations

Vulners
Node
python-gnupg_projectpython-gnupgMatch0.3.5
VendorProductVersionCPE
python-gnupg_projectpython-gnupg0.3.5cpe:2.3:a:python-gnupg_project:python-gnupg:0.3.5:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.013

Percentile

86.1%