Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7x48-7466-3g33

Опубликовано: 18 мар. 2022
Источник: github
Github: Прошло ревью
CVSS4: 6.1
CVSS3: 6.4

Описание

Command injection in guake

Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Note: Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

Пакеты

Наименование

guake

pip
Затронутые версииВерсия исправления

< 3.8.5

3.8.5

EPSS

Процентиль: 74%
0.00823
Низкий

6.1 Medium

CVSS4

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.4
ubuntu
почти 4 года назад

The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

CVSS3: 6.4
nvd
почти 4 года назад

The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

CVSS3: 6.4
debian
почти 4 года назад

The package guake before 3.8.5 are vulnerable to Exposed Dangerous Met ...

EPSS

Процентиль: 74%
0.00823
Низкий

6.1 Medium

CVSS4

6.4 Medium

CVSS3