Vulnerability Name: | CVE-2017-16667 (CCN-134655) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-11-08 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-11-08 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-04-30 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | backintime (aka Back in Time) before 1.1.24 did improper escaping/quoting of file paths used as arguments to the 'notify-send' command, leading to some parts of file paths being executed as shell commands within an os.system call in qt4/plugins/notifyplugin.py. This could allow an attacker to craft an unreadable file with a specific name to run arbitrary shell commands. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-78 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-16667 Source: XF Type: UNKNOWN backintime-cve201716667-cmd-exec(134655) Source: CCN Type: backintime GIT Repository fix critical bug: shell injection in notify-send (fixes #834) Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/bit-team/backintime/commit/cef81d0da93ff601252607df3db1a48f7f6f01b3 Source: CONFIRM Type: Third Party Advisory https://github.com/bit-team/backintime/issues/834 Source: CONFIRM Type: Release Notes, Third Party Advisory https://github.com/bit-team/backintime/releases/tag/v1.1.24 Source: GENTOO Type: Third Party Advisory GLSA-201801-06 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |