svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes).
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1262928 | Issue Tracking Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/svn-workbench/+bug/1495268 | Issue Tracking Third Party Advisory VDB Entry |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798863 | Exploit Issue Tracking Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/09/13/3 | Exploit Mailing List Third Party Advisory |
http://pysvn.tigris.org/issues/show_bug.cgi?id=202 | Exploit Vendor Advisory |
Configurations
Information
Published : 2017-09-06 14:29
Updated : 2021-09-09 10:43
NVD link : CVE-2015-0853
Mitre link : CVE-2015-0853
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
pysvn_project
- svn-workbench