-
-
Notifications
You must be signed in to change notification settings - Fork 32k
[security] Tools/scripts/get-remote-certificate.py is vulnerable to shell code injection #97612
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Comments
Example:
|
I removed mention of CVE-2022-37460: it was withdrawn according to @gpshead. |
vstinner
added a commit
that referenced
this issue
Sep 28, 2022
Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]>
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 28, 2022
…honGH-97613) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 28, 2022
…honGH-97613) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 28, 2022
…honGH-97613) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
miss-islington
pushed a commit
to miss-islington/cpython
that referenced
this issue
Sep 28, 2022
…honGH-97613) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
This was referenced Sep 28, 2022
miss-islington
added a commit
that referenced
this issue
Sep 28, 2022
Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
miss-islington
added a commit
that referenced
this issue
Sep 28, 2022
Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
I created https://discuss.python.org/t/remove-outdated-tools-scripts-scripts/19571 discussion to propose removing outdated example scripts. |
ambv
pushed a commit
that referenced
this issue
Oct 4, 2022
…97613) (GH-97632) gh-97612: Fix shell injection in get-remote-certificate.py (GH-97613) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
ambv
pushed a commit
that referenced
this issue
Oct 4, 2022
…97613) (GH-97633) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44) Co-authored-by: Victor Stinner <[email protected]>
ambv
pushed a commit
that referenced
this issue
Oct 5, 2022
) (#97634) Fix a shell code injection vulnerability in the get-remote-certificate.py example script. The script no longer uses a shell to run "openssl" commands. Issue reported and initial fix by Caleb Shortt. Remove the Windows code path to send "quit" on stdin to the "openssl s_client" command: use DEVNULL on all platforms instead. Co-authored-by: Caleb Shortt <[email protected]> (cherry picked from commit 83a0f44)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The
Tools/scripts/get-remote-certificate.py
script is vulnerable to shell code injection. This vulnerability was reported by Caleb Shortt (@calebshortt).@calebshortt proposed PR #96014 to fix it.
The text was updated successfully, but these errors were encountered: