The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2946-1 | python-gnupg security update |
EUVD |
EUVD-2014-0089 | The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using \"\\\" (backslash) characters to form multi-command sequences, a different vulnerability than CVE-2014-1927. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323. |
Github GHSA |
GHSA-2jc8-4r6g-282j | python-gnupg's shell_quote function does not properly escape characters |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T09:58:15.659Z
Reserved: 2014-02-09T00:00:00
Link: CVE-2014-1928
No data.
Status : Deferred
Published: 2014-10-25T21:55:03.850
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-1928
No data.
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA