sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.
References
Link | Resource |
---|---|
https://bugs.debian.org/881767 | Exploit Issue Tracking Third Party Advisory |
http://metadata.ftp-master.debian.org/changelogs/main/s/sensible-utils/sensible-utils_0.0.11_changelog | Release Notes Vendor Advisory |
https://www.debian.org/security/2017/dsa-4071 | Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00012.html | |
https://usn.ubuntu.com/3584-1/ |
Configurations
Information
Published : 2017-12-10 22:29
Updated : 2018-03-15 18:29
NVD link : CVE-2017-17512
Mitre link : CVE-2017-17512
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
sensible-utils_project
- sensible-utils