CVE-2015-0853

svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes).
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1262928 Issue Tracking Third Party Advisory VDB Entry
https://bugs.launchpad.net/ubuntu/+source/svn-workbench/+bug/1495268 Issue Tracking Third Party Advisory VDB Entry
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798863 Exploit Issue Tracking Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2015/09/13/3 Exploit Mailing List Third Party Advisory
http://pysvn.tigris.org/issues/show_bug.cgi?id=202 Exploit Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:pysvn_project:svn-workbench:*:*:*:*:*:*:*:*

Information

Published : 2017-09-06 14:29

Updated : 2021-09-09 10:43


NVD link : CVE-2015-0853

Mitre link : CVE-2015-0853


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

pysvn_project

  • svn-workbench