CVE-2014-1928: python-gnupg's shell_quote function does not properly escape characters
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42993%
CWE
Published
11/6/2018
Updated
10/25/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
python-gnupg | pip | = 0.3.5 | 0.3.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on the shell_quote function's inadequate escaping demonstrated by:
- CVE description explicitly naming shell_quote as the vulnerable component
- Email thread showing concrete PoC where shell_quote processes backslash-containing input
- Historical context showing this was an incomplete fix for CVE-2013-7323
- Function's direct role in sanitizing inputs for shell commands makes it the primary attack surface
- Debian security advisory DSA-2946-1 listing this CVE confirms the function's critical role