CVE-2017-18266

The open_envvar function in xdg-open in xdg-utils before 1.1.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by %s in this environment variable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freedesktop:xdg-utils:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 03:19

Type Values Removed Values Added
References () https://bugs.freedesktop.org/show_bug.cgi?id=103807 - Issue Tracking, Patch () https://bugs.freedesktop.org/show_bug.cgi?id=103807 - Issue Tracking, Patch
References () https://cgit.freedesktop.org/xdg/xdg-utils/commit/?id=5647afb35e4bcba2060148e1a2a47bc43cc240f2 - Release Notes () https://cgit.freedesktop.org/xdg/xdg-utils/commit/?id=5647afb35e4bcba2060148e1a2a47bc43cc240f2 - Release Notes
References () https://cgit.freedesktop.org/xdg/xdg-utils/commit/?id=ce802d71c3466d1dbb24f2fe9b6db82a1f899bcb - Patch () https://cgit.freedesktop.org/xdg/xdg-utils/commit/?id=ce802d71c3466d1dbb24f2fe9b6db82a1f899bcb - Patch
References () https://cgit.freedesktop.org/xdg/xdg-utils/tree/ChangeLog - Release Notes () https://cgit.freedesktop.org/xdg/xdg-utils/tree/ChangeLog - Release Notes
References () https://lists.debian.org/debian-lts-announce/2018/05/msg00014.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/05/msg00014.html - Third Party Advisory
References () https://usn.ubuntu.com/3650-1/ - Third Party Advisory () https://usn.ubuntu.com/3650-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4211 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4211 - Third Party Advisory

Information

Published : 2018-05-10 14:29

Updated : 2024-11-21 03:19


NVD link : CVE-2017-18266

Mitre link : CVE-2017-18266

CVE.ORG link : CVE-2017-18266


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

freedesktop

  • xdg-utils
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')