[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-1927Date: (C)2014-10-29   (M)2023-12-22


The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-56616
SECUNIA-59031
DSA-2946
http://seclists.org/oss-sec/2014/q1/245
http://seclists.org/oss-sec/2014/q1/294
https://code.google.com/p/python-gnupg/
https://code.google.com/p/python-gnupg/issues/detail?id=98

CPE    1
cpe:/a:python-gnupg_project:python-gnupg:0.3.5
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:106429
oval:org.secpod.oval:def:106427

© SecPod Technologies