CVE-2013-7323 — Improper Input Validation in Project Python-gnupg
Severity
7.5HIGHNVD
NVD4.6NVD4.4
EPSS
1.2%
top 21.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 9
Latest updateNov 6
Description
python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages4 packages
🔴Vulnerability Details
16OSV▶
python-gnupg allows context-dependent attackers to execute arbitrary commands via shell metacharacters↗2018-11-06
📋Vendor Advisories
4Debian▶
CVE-2014-1927: python-gnupg - The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, ...↗2014
Debian▶
CVE-2014-1928: python-gnupg - The shell_quote function in python-gnupg 0.3.5 does not properly escape characte...↗2014
Debian▶
CVE-2014-1929: python-gnupg - python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspe...↗2014
Debian▶
CVE-2013-7323: python-gnupg - python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrar...↗2013
💬Community
1Bugzilla▶
CVE-2013-7323 CVE-2014-1927 CVE-2014-1928 CVE-2014-1929 python-gnupg: incorrect fix against shell injection↗2014-02-05