You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
tqdm CLI arguments injection attack
Low severity
GitHub Reviewed
Published
May 2, 2024
in
tqdm/tqdm
•
Updated Jun 10, 2024
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Learn more on MITRE.
Impact
Any optional non-boolean CLI arguments (e.g.
--delim
,--buf-size
,--manpath
) are passed through python'seval
, allowing arbitrary code execution. Example:python -m tqdm --manpath="\" + str(exec(\"import os\nos.system('echo hi && killall python3')\")) + \""
Patches
tqdm/tqdm@4e613f8 released in
tqdm>=4.66.3
Workarounds
None
References
References