Commit graph

5 commits

Author SHA1 Message Date
Miss Islington (bot)
d6ef6805b2
[3.9] gh-97612: Fix shell injection in get-remote-certificate.py (GH-97613) (GH-97632)
gh-97612: Fix shell injection in get-remote-certificate.py (GH-97613)

Fix a shell code injection vulnerability in the
get-remote-certificate.py example script. The script no longer uses a
shell to run "openssl" commands. Issue reported and initial fix by
Caleb Shortt.

Remove the Windows code path to send "quit" on stdin to the "openssl
s_client" command: use DEVNULL on all platforms instead.

Co-authored-by: Caleb Shortt <caleb@rgauge.com>
(cherry picked from commit 83a0f44ffd)

Co-authored-by: Victor Stinner <vstinner@python.org>
2022-10-04 10:00:16 -07:00
Serhiy Storchaka
172bb39452
bpo-22831: Use "with" to avoid possible fd leaks in tools (part 2). (GH-10927) 2019-03-30 08:33:02 +02:00
Éric Araujo
a0e92a8028 Fix missing or wrong shebangs and missing executable bits for scripts (#10318) 2011-07-26 18:01:08 +02:00
Georg Brandl
30baf2b0ed Fix NameErrors. 2010-12-30 17:36:17 +00:00
Georg Brandl
5684a9ac30 Clean up tools: remove "world" and "framer", move single SSL script to scripts/. 2010-12-30 17:32:22 +00:00
Renamed from Tools/ssl/get-remote-certificate.py (Browse further)