Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mZmY4LTR3OXAtN3Y3Ns4AAbau
Command Injection in Pygments
The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name.
Permalink: https://github.com/advisories/GHSA-fff8-4w9p-7v76JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mZmY4LTR3OXAtN3Y3Ns4AAbau
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 2 years ago
Updated: about 1 year ago
CVSS Score: 9.0
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Identifiers: GHSA-fff8-4w9p-7v76, CVE-2015-8557
References:
- https://nvd.nist.gov/vuln/detail/CVE-2015-8557
- https://bitbucket.org/birkenfeld/pygments-main/pull-requests/501/fix-shell-injection-in/diff
- https://security.gentoo.org/glsa/201612-05
- http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html
- http://seclists.org/fulldisclosure/2015/Oct/4
- http://www.debian.org/security/2016/dsa-3445
- http://www.openwall.com/lists/oss-security/2015/12/14/17
- http://www.openwall.com/lists/oss-security/2015/12/14/6
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.ubuntu.com/usn/USN-2862-1
- https://github.com/advisories/GHSA-fff8-4w9p-7v76
- https://github.com/pypa/advisory-database/tree/main/vulns/pygments/PYSEC-2016-32.yaml
- https://github.com/pygments/pygments/commit/db6dd826f8624179e563aaded391efe824462f51
Blast Radius: 43.6
Affected Packages
pypi:Pygments
Dependent packages: 1,074Dependent repositories: 70,561
Downloads: 94,488,597 last month
Affected Version Ranges: >= 1.2.2, < 2.1
Fixed in: 2.1
All affected versions: 1.2.2, 1.3.1, 2.0.1, 2.0.2
All unaffected versions: 0.5.1, 0.7.1, 0.8.1, 0.11.1, 1.1.1, 1.2.1, 2.1.1, 2.1.2, 2.1.3, 2.2.0, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.4.2, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.8.0, 2.8.1, 2.9.0, 2.10.0, 2.11.0, 2.11.1, 2.11.2, 2.12.0, 2.13.0, 2.14.0, 2.15.0, 2.15.1, 2.16.0, 2.16.1, 2.17.0, 2.17.1, 2.17.2