debmany in debian-goodies 0.88.1 allows attackers to execute arbitrary shell commands (because of an eval call) via a crafted .deb file. (The path is shown to the user before execution.)
References
Link | Resource |
---|---|
https://bugs.debian.org/1031267 | Vendor Advisory |
https://bugs.debian.org/1031267 | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/1031267 - Vendor Advisory |
13 Mar 2023, 16:40
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://bugs.debian.org/1031267 - Vendor Advisory | |
CPE | cpe:2.3:a:debian:debmany:0.88.1:*:*:*:*:*:*:* | |
CWE | CWE-74 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
06 Mar 2023, 04:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-05 22:15
Updated : 2024-11-21 07:53
NVD link : CVE-2023-27635
Mitre link : CVE-2023-27635
CVE.ORG link : CVE-2023-27635
JSON object : View
Products Affected
debian
- debmany
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')