A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1819-1 | pyxdg security update |
Debian DLA |
DLA-2727-1 | pyxdg security update |
EUVD |
EUVD-2019-0119 | A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call. |
Github GHSA |
GHSA-r6v3-hpxj-r8rv | Code Injection in PyXDG |
Ubuntu USN |
USN-4700-1 | PyXDG vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:32:54.641Z
Reserved: 2019-06-06T00:00:00
Link: CVE-2019-12761
No data.
Status : Modified
Published: 2019-06-06T19:29:00.533
Modified: 2024-11-21T04:23:31.233
Link: CVE-2019-12761
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN