]> git.ipfire.org Git - thirdparty/Python/cpython.git/commit
[3.7] gh-97612: Fix shell injection in get-remote-certificate.py (#97613) (#97634)
authorVictor Stinner <vstinner@python.org>
Wed, 5 Oct 2022 21:56:13 +0000 (23:56 +0200)
committerGitHub <noreply@github.com>
Wed, 5 Oct 2022 21:56:13 +0000 (14:56 -0700)
commitc7ec7808191fc29f75d96496b682bd34be770a8f
tree0620c3816b5db7bb01a82f8945d018b8d95a7782
parentfd82f16c1e4d9a0661e9a2250004032797652e69
[3.7] gh-97612: Fix shell injection in get-remote-certificate.py (#97613) (#97634)

Fix a shell code injection vulnerability in the
get-remote-certificate.py example script. The script no longer uses a
shell to run "openssl" commands. Issue reported and initial fix by
Caleb Shortt.

Remove the Windows code path to send "quit" on stdin to the "openssl
s_client" command: use DEVNULL on all platforms instead.

Co-authored-by: Caleb Shortt <caleb@rgauge.com>
(cherry picked from commit 83a0f44ffd8b398673ae56c310cf5768d359c341)
Misc/NEWS.d/next/Security/2022-09-28-12-10-57.gh-issue-97612.y6NvOQ.rst [new file with mode: 0644]
Tools/scripts/get-remote-certificate.py