First published: Thu Apr 14 2022(Updated: )
A command injection vulnerability was found in Python 2.x and 3.x, specifically within the mailcap module. Mailcap core-module is based on the format documented in RFC 1524. The “findmatch()” function does not sanitise the second argument (filename). As a result, the legitimate command (that is used for opening the specified mime type) is concatenated with an arbitrary command, injected by an attacker.
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | >=2.0<=3.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2075390 is classified as high due to the potential for command injection.
To fix REDHAT-BUG-2075390, you should update to the latest version of Python that addresses this vulnerability.
REDHAT-BUG-2075390 affects Python versions from 2.0 to 3.x.
The vulnerable component in REDHAT-BUG-2075390 is the mailcap module, specifically the findmatch() function.
Yes, if exploited, REDHAT-BUG-2075390 can potentially lead to remote code execution through command injection.