svn-workbench 1.6.2 and earlier on a system with xeyes installed allows local users to execute arbitrary commands by using the "Command Shell" menu item while in the directory trunk/$(xeyes).
References
Link | Resource |
---|---|
http://pysvn.tigris.org/issues/show_bug.cgi?id=202 | Exploit Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/09/13/3 | Exploit Mailing List Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798863 | Exploit Issue Tracking Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/svn-workbench/+bug/1495268 | Issue Tracking Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1262928 | Issue Tracking Third Party Advisory VDB Entry |
Configurations
History
09 Sep 2021, 17:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pysvn_project:svn-workbench:*:*:*:*:*:*:*:* |
Information
Published : 2017-09-06 21:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-0853
Mitre link : CVE-2015-0853
CVE.ORG link : CVE-2015-0853
JSON object : View
Products Affected
pysvn_project
- svn-workbench
CWE
CWE-20
Improper Input Validation