The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://secunia.com/advisories/56616 | third party advisory |
http://www.debian.org/security/2014/dsa-2946 | vendor advisory |
http://seclists.org/oss-sec/2014/q1/245 | mailing list exploit |
https://code.google.com/p/python-gnupg/issues/detail?id=98 | exploit |
https://code.google.com/p/python-gnupg/ | |
http://seclists.org/oss-sec/2014/q1/294 | mailing list exploit |
http://secunia.com/advisories/59031 | third party advisory |