The Debian python-rdflib-tools 4.2.2-1 package for RDFLib 4.2.2 has CLI tools that can load Python modules from the current working directory, allowing code injection, because "python -m" looks in this directory, as demonstrated by rdf2dot. This issue is specific to use of the debian/scripts directory.
References
Link | Resource |
---|---|
https://bugs.debian.org/921751 | Exploit Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00019.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00026.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4535-1/ | Third Party Advisory |
https://bugs.debian.org/921751 | Exploit Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00019.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/12/msg00026.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4535-1/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-02-09 03:29
Updated : 2024-11-21 04:48
NVD link : CVE-2019-7653
Mitre link : CVE-2019-7653
CVE.ORG link : CVE-2019-7653
JSON object : View
Products Affected
rdflib_project
- rdflib
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-427
Uncontrolled Search Path Element