mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 05:58:08 +00:00
Merge branch 'DWF-2018-09-14-01' of https://github.com/distributedweaknessfiling/cvelist
This commit is contained in:
commit
018af420f2
1
2018/1000xxx/CVE-2018-1000802.json
Normal file
1
2018/1000xxx/CVE-2018-1000802.json
Normal file
@ -0,0 +1 @@
|
||||
{"data_version": "4.0","references": {"reference_data": [{"url": "https://bugs.python.org/issue34540"},{"url": "https://github.com/python/cpython/pull/8985"},{"url": "https://github.com/python/cpython/pull/8985/commits/add531a1e55b0a739b0f42582f1c9747e5649ace"},{"url": "https://mega.nz/#!JUFiCC4R!mq-jQ8ySFwIhX6WMDujaZuNBfttDVt7DETlfOIQE1ig"}]},"description": {"description_data": [{"lang": "eng","value": "Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace."}]},"data_type": "CVE","affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"version": {"version_data": [{"version_value": "2.7"}]},"product_name": "Python (CPython)"}]},"vendor_name": "Python Software Foundation"}]}},"CVE_data_meta": {"DATE_ASSIGNED": "2018-09-14T14:17:47.506460","DATE_REQUESTED": "2018-08-30T11:34:18","ID": "CVE-2018-1000802","ASSIGNER": "kurt@seifried.org","REQUESTER": "kochukov.ma@gmail.com"},"data_format": "MITRE","problemtype": {"problemtype_data": [{"description": [{"lang": "eng","value": "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}]}}
|
Loading…
x
Reference in New Issue
Block a user