Medium severity6.3NVD Advisory· Published Apr 27, 2024· Updated Apr 15, 2026
CVE-2023-1000
CVE-2023-1000
Description
A vulnerability was found in cyanomiko dcnnt-py up to 0.9.0. It has been classified as critical. Affected is the function main of the file dcnnt/plugins/notifications.py of the component Notification Handler. The manipulation leads to command injection. It is possible to launch the attack remotely. Upgrading to version 0.9.1 is able to address this issue. The patch is identified as b4021d784a97e25151a5353aa763a741e9a148f5. It is recommended to upgrade the affected component. VDB-262230 is the identifier assigned to this vulnerability.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dcnntPyPI | < 0.9.1 | 0.9.1 |
Patches
2b4021d784a97Fix command ijection vulnerability
1 file changed · +2 −1
dcnnt/plugins/notifications.py+2 −1 modified@@ -1,5 +1,6 @@ import logging import subprocess +from shlex import quote from .base import Plugin from ..common import * @@ -53,6 +54,6 @@ def main(self): except Exception as e: self.log(e, logging.WARNING) icon = icon_path if icon_data else '' - command = cmd.format(uin=uin, name=name, icon=icon, text=text, title=title, package=package) + command = cmd.format(uin=quote(uin), name=quote(name), icon=quote(icon), text=quote(text), title=quote(title), package=quote(package)) self.log('Execute: "{}"'.format(command)) subprocess.call(command, shell=True)
5dd411ab7e9eVulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
7- github.com/advisories/GHSA-8p42-7597-p2f6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-1000ghsaADVISORY
- github.com/cyanomiko/dcnnt-py/commit/b4021d784a97e25151a5353aa763a741e9a148f5nvdWEB
- github.com/cyanomiko/dcnnt-py/pull/23nvdWEB
- github.com/cyanomiko/dcnnt-py/releases/tag/0.9.1nvdWEB
- vuldb.comnvdWEB
- vuldb.comnvdWEB
News mentions
0No linked articles in our index yet.