svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes).
References
Configurations
History
21 Nov 2024, 02:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://pysvn.tigris.org/issues/show_bug.cgi?id=202 - Exploit, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/09/13/3 - Exploit, Mailing List, Third Party Advisory | |
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798863 - Exploit, Issue Tracking, Third Party Advisory, VDB Entry | |
References | () https://bugs.launchpad.net/ubuntu/+source/svn-workbench/+bug/1495268 - Issue Tracking, Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1262928 - Issue Tracking, Third Party Advisory, VDB Entry |
09 Sep 2021, 17:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pysvn_project:svn-workbench:*:*:*:*:*:*:*:* |
Information
Published : 2017-09-06 21:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-0853
Mitre link : CVE-2015-0853
CVE.ORG link : CVE-2015-0853
JSON object : View
Products Affected
pysvn_project
- svn-workbench
CWE
CWE-20
Improper Input Validation