The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html - | |
References | () http://seclists.org/fulldisclosure/2015/Oct/4 - | |
References | () http://www.debian.org/security/2016/dsa-3445 - | |
References | () http://www.openwall.com/lists/oss-security/2015/12/14/17 - | |
References | () http://www.openwall.com/lists/oss-security/2015/12/14/6 - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html - | |
References | () http://www.ubuntu.com/usn/USN-2862-1 - | |
References | () https://bitbucket.org/birkenfeld/pygments-main/pull-requests/501/fix-shell-injection-in/diff - Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201612-05 - |
Information
Published : 2016-01-08 20:59
Updated : 2024-11-21 02:38
NVD link : CVE-2015-8557
Mitre link : CVE-2015-8557
CVE.ORG link : CVE-2015-8557
JSON object : View
Products Affected
canonical
- ubuntu_linux
pygments
- pygments
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')