CVE-2013-7323Improper Input Validation in Project Python-gnupg

Severity
7.5HIGHNVD
NVD4.6NVD4.4
EPSS
1.2%
top 21.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9
Latest updateNov 6

Description

python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

🔴Vulnerability Details

16
OSV
python-gnupg's shell_quote function does not properly quote strings2018-11-06
GHSA
python-gnupg vulnerable to shell injection2018-11-06
OSV
python-gnupg vulnerable to shell injection2018-11-06
GHSA
python-gnupg's shell_quote function does not properly quote strings2018-11-06
OSV
python-gnupg allows context-dependent attackers to execute arbitrary commands via shell metacharacters2018-11-06

📋Vendor Advisories

4
Debian
CVE-2014-1927: python-gnupg - The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, ...2014
Debian
CVE-2014-1928: python-gnupg - The shell_quote function in python-gnupg 0.3.5 does not properly escape characte...2014
Debian
CVE-2014-1929: python-gnupg - python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspe...2014
Debian
CVE-2013-7323: python-gnupg - python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrar...2013

💬Community

1
Bugzilla
CVE-2013-7323 CVE-2014-1927 CVE-2014-1928 CVE-2014-1929 python-gnupg: incorrect fix against shell injection2014-02-05
CVE-2013-7323 — Improper Input Validation | cvebase