PYSEC-2018-76

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/topydo/PYSEC-2018-76.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2018-76
Aliases
Published
2018-06-26T16:29:00Z
Modified
2025-10-09T05:34:19.294491Z
Summary
[none]
Details

topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line..

References

Affected packages

PyPI / topydo

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.1
0.1.1
0.1.2
0.2
0.3
0.3.1
0.3.2
0.4
0.4.1
0.5
0.6
0.7
0.8
0.9
0.10
0.10.1
0.11
0.12
0.13
0.14
0.15

Database specific

source
"https://github.com/pypa/advisory-database/blob/main/vulns/topydo/PYSEC-2018-76.yaml"