| Vulnerability Name: | CVE-2019-7653 (CCN-157218) | ||||||||||||||||||||||||||||||||||||
| Assigned: | 2019-02-08 | ||||||||||||||||||||||||||||||||||||
| Published: | 2019-02-08 | ||||||||||||||||||||||||||||||||||||
| Updated: | 2022-04-06 | ||||||||||||||||||||||||||||||||||||
| Summary: | The Debian python-rdflib-tools 4.2.2-1 package for RDFLib 4.2.2 has CLI tools that can load Python modules from the current working directory, allowing code injection, because "python -m" looks in this directory, as demonstrated by rdf2dot. This issue is specific to use of the debian/scripts directory. | ||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-427 | ||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-7653 Source: MISC Type: Exploit, Mailing List, Third Party Advisory https://bugs.debian.org/921751 Source: CCN Type: Debian Bug report logs - #921751 python-rdflib-tools: CVE-2019-7653: Code injection from current working directory Source: XF Type: UNKNOWN rdflib-cve20197653-code-exec(157218) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20190318 [SECURITY] [DLA 1717-1] rdflib security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20211228 [SECURITY] [DLA 2861-1] rdflib security update Source: CCN Type: Debian Web site RDFLib Source: UBUNTU Type: Third Party Advisory USN-4535-1 | ||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||