Vulnerability Details : CVE-2015-8557
The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 through 2.0.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a font name.
Products affected by CVE-2015-8557
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:a:pygments:pygments:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:1.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:2.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:pygments:pygments:1.2.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8557
1.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8557
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
9.0
|
CRITICAL | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
2.2
|
6.0
|
NIST |
CWE ids for CVE-2015-8557
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8557
-
https://security.gentoo.org/glsa/201612-05
Pygments: Arbitrary code execution (GLSA 201612-05) — Gentoo security
-
https://bitbucket.org/birkenfeld/pygments-main/pull-requests/501/fix-shell-injection-in/diff
birkenfeld / pygments-main / Pull request #501: Fix Shell Injection in FontManager._get_nix_font_path — BitbucketVendor Advisory
-
http://www.debian.org/security/2016/dsa-3445
Debian -- Security Information -- DSA-3445-1 pygments
-
http://seclists.org/fulldisclosure/2015/Oct/4
Full Disclosure: Shell Injection in Pygments FontManager._get_nix_font_path
-
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
Oracle Solaris Bulletin - January 2016
-
http://packetstormsecurity.com/files/133823/Pygments-FontManager._get_nix_font_path-Shell-Injection.html
Pygments FontManager._get_nix_font_path Shell Injection ≈ Packet Storm
-
http://www.ubuntu.com/usn/USN-2862-1
USN-2862-1: Pygments vulnerability | Ubuntu security notices
-
http://www.openwall.com/lists/oss-security/2015/12/14/17
oss-security - Re: CVE request: Shell Injection in Pygments FontManager._get_nix_font_path
-
http://www.openwall.com/lists/oss-security/2015/12/14/6
oss-security - CVE request: Shell Injection in Pygments FontManager._get_nix_font_path
Jump to