CVE-2017-17522
Published: December 14, 2017Last modified: July 22, 2025
Description
Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 8.8 | 
| Attack Vector | NETWORK | 
| Attack complexity | LOW | 
| Privileges required | NONE | 
| User interaction | REQUIRED | 
| Scope | UNCHANGED | 
| Confidentiality | HIGH | 
| Integrity impact | HIGH | 
| Availability impact | HIGH | 
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | python3 | Not affected (3.11.5-r0) | 
| Stream | python3 | Not affected (3.11.5-r0) | |
| Hardened Containers | 23 LTS | python3 | Not affected (3.11.5-r0) | 
| Stream | python3 | Not affected (3.11.5-r0) |