Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. topydo
  4. ›
  5. CVE-2018-1000523

CVE-2018-1000523: Topydo Improper Input Validation vulnerability

September 13, 2018 (updated November 13, 2024)

topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line.

References

  • github.com/advisories/GHSA-h6h9-pphv-m266
  • github.com/bram85/topydo
  • github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py
  • github.com/bram85/topydo/issues/240
  • github.com/pypa/advisory-database/tree/main/vulns/topydo/PYSEC-2018-76.yaml
  • nvd.nist.gov/vuln/detail/CVE-2018-1000523

Code Behaviors & Features

Detect and mitigate CVE-2018-1000523 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.13

Solution

Unfortunately, there is no solution available yet.

Impact 8.1 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

pypi/topydo/CVE-2018-1000523.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:50 +0000.