Skip to content

Commit a4b44d3

Browse files
authored
gh-114539: Clarify implicit launching of shells by subprocess (GH-117996)
1 parent 353ea0b commit a4b44d3

File tree

1 file changed

+10
-2
lines changed

1 file changed

+10
-2
lines changed

Doc/library/subprocess.rst

+10-2
Original file line numberDiff line numberDiff line change
@@ -754,8 +754,8 @@ Exceptions defined in this module all inherit from :exc:`SubprocessError`.
754754
Security Considerations
755755
-----------------------
756756

757-
Unlike some other popen functions, this implementation will never
758-
implicitly call a system shell. This means that all characters,
757+
Unlike some other popen functions, this library will not
758+
implicitly choose to call a system shell. This means that all characters,
759759
including shell metacharacters, can safely be passed to child processes.
760760
If the shell is invoked explicitly, via ``shell=True``, it is the application's
761761
responsibility to ensure that all whitespace and metacharacters are
@@ -764,6 +764,14 @@ quoted appropriately to avoid
764764
vulnerabilities. On :ref:`some platforms <shlex-quote-warning>`, it is possible
765765
to use :func:`shlex.quote` for this escaping.
766766

767+
On Windows, batch files (:file:`*.bat` or :file:`*.cmd`) may be launched by the
768+
operating system in a system shell regardless of the arguments passed to this
769+
library. This could result in arguments being parsed according to shell rules,
770+
but without any escaping added by Python. If you are intentionally launching a
771+
batch file with arguments from untrusted sources, consider passing
772+
``shell=True`` to allow Python to escape special characters. See :gh:`114539`
773+
for additional discussion.
774+
767775

768776
Popen Objects
769777
-------------

0 commit comments

Comments
 (0)