{"id":"AZL-6823","summary":"CVE-2017-17522 affecting package python2 for versions less than 2.7.18-8","details":"Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting","modified":"2026-04-21T04:38:22.246402Z","published":"2017-12-14T16:29:00Z","upstream":["CVE-2017-17522"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17522"}],"affected":[{"package":{"name":"python2","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/python2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.18-8"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-6823.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}