Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-49091

Опубликовано: 11 июн. 2025
Источник: redhat
CVSS3: 8.3

Описание

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

A flaw was found in Konsole. The application's handling of URLs using scheme handlers like ssh://, telnet://, or rlogin:// allows a remote attacker to trigger arbitrary code execution. This issue occurs when a user opens a specially crafted URL, bypassing authentication checks. Consequently, a malicious URL can be used to execute commands on the system.

Отчет

This vulnerability was rated as an IMPORTANT vulnerability because the Konsole's handling of URLs containing scheme handlers such as ssh://, telnet://, or rlogin://. When a user opens a specially crafted URL, Konsole automatically processes the scheme without adequate validation or authentication enforcement. This behavior allows a remote attacker to craft malicious URLs that can trigger arbitrary command execution on the user’s system, resulting in a severe compromise of system confidentiality, integrity, and availability.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7konsoleAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-670
https://bugzilla.redhat.com/show_bug.cgi?id=2371635konsole: Konsole Remote Code Execution Vulnerability

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
ubuntu
2 месяца назад

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

CVSS3: 8.2
nvd
2 месяца назад

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

CVSS3: 8.2
debian
2 месяца назад

KDE Konsole before 25.04.2 allows remote code execution in a certain s ...

CVSS3: 8.2
github
2 месяца назад

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

CVSS3: 8.2
fstec
2 месяца назад

Уязвимость эмулятора терминала Konsole среды рабочего стола KDE, позволяющая нарушителю выполнить произвольный код

8.3 High

CVSS3