First published: Sun Aug 02 2015(Updated: )
A command injection vulnerability was found in Python 2.x and 3.x, specifically within the mailcap module. Mailcap core-module is based on the format documented in RFC 1524. The “findmatch()” function does not sanitise the second argument (filename). As a result, the legitimate command (that is used for opening the specified mime type) is concatenated with an arbitrary command, injected by an attacker.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python3 | <0:3.6.8-47.el8_6 | 0:3.6.8-47.el8_6 |
redhat/python3.9 | <0:3.9.14-1.el9 | 0:3.9.14-1.el9 |
redhat/rh-python38-python | <0:3.8.14-1.el7 | 0:3.8.14-1.el7 |
Python Python | >=3.7.0<=3.7.15 | |
Python Python | >=3.8.0<=3.8.15 | |
Python Python | >=3.9.0<=3.9.15 | |
Python Python | >=3.10.0<3.10.8 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
NetApp ONTAP Select Deploy administration utility | ||
Netapp Snapcenter | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
debian/python2.7 | <=2.7.18-8+deb11u1 | |
debian/python3.9 | <=3.9.2-1 | |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Users should upgrade to the latest version. If this is not possible and the affected version of the Python mailcap module has to be used then applications that use mailcap module should verify user input before passing it to the mailcap module, and the returned command before executing it.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2015-20107 is a command injection vulnerability found in the Python mailcap module.
CVE-2015-20107 affects Python versions up to 3.10.8.
CVE-2015-20107 has a severity rating of high.
CVE-2015-20107 can be exploited by injecting shell commands into applications that call mailcap.findmatch with untrusted input.
The recommended remedy for CVE-2015-20107 is to update to the fixed versions of Python mentioned in the references.