Description
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.
Published: 2019-06-06
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1819-1 pyxdg security update
Debian DLA Debian DLA DLA-2727-1 pyxdg security update
EUVD EUVD EUVD-2019-0119 A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.
Github GHSA Github GHSA GHSA-r6v3-hpxj-r8rv Code Injection in PyXDG
Ubuntu USN Ubuntu USN USN-4700-1 PyXDG vulnerability
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:32:54.641Z

Reserved: 2019-06-06T00:00:00.000Z

Link: CVE-2019-12761

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-06T19:29:00.533

Modified: 2024-11-21T04:23:31.233

Link: CVE-2019-12761

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-06-01T00:00:00Z

Links: CVE-2019-12761 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses