The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2946-1 | python-gnupg security update |
EUVD |
EUVD-2014-0088 | The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using \"$(\" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. |
Github GHSA |
GHSA-r3vr-prwv-86g9 | python-gnupg's shell_quote function does not properly quote strings |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T09:58:15.702Z
Reserved: 2014-02-09T00:00:00
Link: CVE-2014-1927
No data.
Status : Deferred
Published: 2014-10-25T21:55:03.787
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-1927
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA