Vulnerability Name: | CVE-2017-17522 (CCN-136385) | ||||||||||||||||||||
Assigned: | 2017-12-14 | ||||||||||||||||||||
Published: | 2017-12-14 | ||||||||||||||||||||
Updated: | 2017-12-28 | ||||||||||||||||||||
Summary: | ** DISPUTED ** Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. Note: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting. | ||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
6.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:U/RC:R)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-74 | ||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-17522 Source: BID Type: Third Party Advisory, VDB Entry 102207 Source: CCN Type: BID-102207 Python 'Lib/webbrowser.py' Remote Command Execution Vulnerability Source: MISC Type: UNKNOWN https://bugs.python.org/issue32367 Source: XF Type: UNKNOWN debian-cve201717522-sec-bypass(136385) Source: CCN Type: Debian Web site CVE-2017-17522 Source: MISC Type: Issue Tracking, Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2017-17522 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-17522 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |