Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:51:32.298Z
Reserved: 2017-12-11T00:00:00
Link: CVE-2017-17522
No data.
Status : Deferred
Published: 2017-12-14T16:29:00.713
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-17522
OpenCVE Enrichment
No data.