CVE-2018-20167
https://notcve.org/view.php?id=CVE-2018-20167
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME types (/usr/share/applications). The control sequence defers unknown file types to the handle_unknown_media() function, which executes xdg-open against the filename specified in the sequence. The use of xdg-open for all unknown file types allows executable file formats with a registered shared MIME type to be executed. An attacker can achieve remote code execution by introducing an executable file and a plain text file containing the control sequence through a fake software project (e.g., in Git or a tarball). • https://phab.enlightenment.org/T7504 https://phab.enlightenment.org/rTRM1ac204da9148e7bccb1b5f34b523e2094dfc39e2 https://www.enlightenment.org/news/2018-12-16-terminology-1.3.1 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2015-8971
https://notcve.org/view.php?id=CVE-2015-8971
Terminology 0.7.0 allows remote attackers to execute arbitrary commands via escape sequences that modify the window title and then are written to the terminal, a similar issue to CVE-2003-0063. Terminology 0.7.0 permite a atacantes remotos ejecutar comandos arbitrarios a través de secuencias de escape que modifican el título de la ventana y luego se escriben a el terminal, un problema similar a CVE-2003-0063. • http://www.debian.org/security/2016/dsa-3712 http://www.openwall.com/lists/oss-security/2016/11/04/12 http://www.openwall.com/lists/oss-security/2016/11/04/15 http://www.openwall.com/lists/oss-security/2016/11/07/1 http://www.securityfocus.com/bid/94132 https://git.enlightenment.org/apps/terminology.git/commit/?id=b80bedc7c21ecffe99d8d142930db696eebdd6a5 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •