Arbitrary Code Execution Affecting python-gnupg package, versions [0.3.5]
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
0.19% (56th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PYTHONGNUPG-40271
- published 1 Aug 2017
- disclosed 4 Feb 2014
- credit Unknown
Overview
python-gnupg
is a wrapper for the Gnu Privacy Guard (GPG or GnuPG).
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927.
NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.