Vulnerability Description
Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Python | Python | <= 3.6.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102207Third Party AdvisoryVDB Entry
- https://bugs.python.org/issue32367
- https://security-tracker.debian.org/tracker/CVE-2017-17522Issue TrackingThird Party Advisory
- http://www.securityfocus.com/bid/102207Third Party AdvisoryVDB Entry
- https://bugs.python.org/issue32367
- https://security-tracker.debian.org/tracker/CVE-2017-17522Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-17522?
CVE-2017-17522 is a vulnerability with a CVSS score of 8.8 (HIGH). Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-i...
How severe is CVE-2017-17522?
CVE-2017-17522 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17522?
Check the references section above for vendor advisories and patch information. Affected products include: Python Python.