-
CVSS Score
-The vulnerability stems from improper handling of the BROWSER environment variable when launching a browser. The description explicitly identifies scripts/inspect_webbrowser.py as the vulnerable component, and CWE-74 indicates an injection flaw. The most likely vulnerable function is the browser-launching routine that directly uses BROWSER+URL in a system call without validation. This matches Python's common subprocess/os.system injection pattern when handling environment variables. Though the exact code isn't available, the file path and vulnerability mechanics strongly indicate this function as the injection point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rtv | pip | <= 1.19.0 |
A Semantic Attack on Google Gemini - Read the Latest Research