Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jq43-q8mx-r7mq

Опубликовано: 14 июл. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

SwiftTerm Code Injection vulnerability

Impact

Attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.

Credit

These bugs were found and disclosed by David Leadbeater dgl@dgl.cx (@dgl at Github.com)

Patches

Fixed in version ce596e0dc8cdb288bc7ed5c6a59011ee3a8dc171

Workarounds

There are no workarounds available

References

Similar exploits to this existed in the past, for terminal emulators:

https://nvd.nist.gov/vuln/detail/CVE-2003-0063 https://nvd.nist.gov/vuln/detail/CVE-2008-2383

Additional background and information is also available:

https://marc.info/?l=bugtraq&m=104612710031920&w=2 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510030

Пакеты

Наименование

github.com/migueldeicaza/SwiftTerm

Затронутые версииВерсия исправления

< 1.2.0

1.2.0

EPSS

Процентиль: 34%
0.00138
Низкий

7.1 High

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 7.1
nvd
около 3 лет назад

SwiftTerm is a Xterm/VT100 Terminal emulator. Prior to commit a94e6b24d24ce9680ad79884992e1dff8e150a31, an attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. Version a94e6b24d24ce9680ad79884992e1dff8e150a31 contains a patch for this issue. There are no known workarounds available.

EPSS

Процентиль: 34%
0.00138
Низкий

7.1 High

CVSS3

Дефекты

CWE-94