An open API service providing security vulnerability metadata for many open source software ecosystems.

MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXIzdnItcHJ3di04Nmc5

High CVSS: 8.7 EPSS: 0.00727% (0.7155 Percentile) EPSS:

python-gnupg's shell_quote function does not properly quote strings

Affected Packages Affected Versions Fixed Versions
pypi:python-gnupg
PURL: pkg:pypi/python-gnupg
= 0.3.5 0.3.6
90 Dependent packages
2,116 Dependent repositories
13,115,696 Downloads last month

Affected Version Ranges

All affected versions

All unaffected versions

0.2.3, 0.2.4, 0.2.6, 0.2.7, 0.2.8, 0.2.9, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.3.7, 0.3.8, 0.3.9, 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.4, 0.4.5, 0.4.6, 0.4.7, 0.4.8, 0.4.9, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5

The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

References: