First published: Thu Dec 14 2017(Updated: )
** DISPUTED ** Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/jython | <=2.7.2+repack1-3<=2.7.3+repack1-1 | |
debian/python2.7 | <=2.7.18-8+deb11u1 | |
Python Babel Localedata | <=3.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17522 is classified as a disputed vulnerability, suggesting potential risks for argument-injection attacks.
CVE-2017-17522 affects various Python versions, including Python 3.6.3 and earlier, as well as Jython and Python 2.7.18.
Yes, CVE-2017-17522 may allow remote attackers to exploit the vulnerability through specially crafted URLs.
To mitigate CVE-2017-17522, it's recommended to upgrade to a version of Python that properly validates the BROWSER environment variable.
While primarily affecting Python, the vulnerability can impact applications that rely on the affected versions of the language.