XML Injection

Affecting pyxdg package, versions *

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.

References

CVSS Score

7.5
low severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    Required
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE
CVE-2019-12761
CWE
CWE-91
Snyk ID
SNYK-DEBIAN10-PYXDG-349405
Disclosed
06 Jun, 2019
Published
06 Jun, 2019