CVE-2015-0853

svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes).
References
Link Resource
http://pysvn.tigris.org/issues/show_bug.cgi?id=202 Exploit Vendor Advisory
http://www.openwall.com/lists/oss-security/2015/09/13/3 Exploit Mailing List Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798863 Exploit Issue Tracking Third Party Advisory VDB Entry
https://bugs.launchpad.net/ubuntu/+source/svn-workbench/+bug/1495268 Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1262928 Issue Tracking Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:pysvn_project:svn-workbench:*:*:*:*:*:*:*:*

History

09 Sep 2021, 17:43

Type Values Removed Values Added
CPE cpe:2.3:a:pysvn:svn-workbench:*:*:*:*:*:*:*:* cpe:2.3:a:pysvn_project:svn-workbench:*:*:*:*:*:*:*:*

Information

Published : 2017-09-06 21:29

Updated : 2024-02-04 19:29


NVD link : CVE-2015-0853

Mitre link : CVE-2015-0853

CVE.ORG link : CVE-2015-0853


JSON object : View

Products Affected

pysvn_project

  • svn-workbench
CWE
CWE-20

Improper Input Validation