CVE-2018-6353

The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022.
References
Link Resource
https://github.com/spesmilo/electrum/pull/3700 Third Party Advisory
https://github.com/spesmilo/electrum/issues/3678 Exploit Issue Tracking Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:electrum:electrum:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:*:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.2:*:*:*:*:*:*:*

Information

Published : 2018-01-27 07:29

Updated : 2018-02-15 08:32


NVD link : CVE-2018-6353

Mitre link : CVE-2018-6353


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Advertisement

dedicated server usa

Products Affected

electrum

  • electrum