2 results (0.030 seconds)

CVSS: 8.8EPSS: 4%CPEs: 24EXPL: 0

Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its filename, related to pb_controller.cpp and queueloader.cpp, a different vulnerability than CVE-2017-12904. No se neutralizan correctamente los elementos especiales utilizados en un comando de sistema operativo en la función de reproducción de podcasts de Podbeuter en Newsbeuter de la versión 0.3 a la 2.9. Esto permite a atacantes remotos ejecutar código proporcionado por el usuario manipulando un elemento RSS con un adjunto audiovisual (es decir, un archivo podcast) que incluye metacaracteres shell en su nombre de archivo. Esto está relacionado con pb_controller.cpp y queueloader.cpp. Esta vulnerabilidad es distinta a CVE-2017-12904. • http://openwall.com/lists/oss-security/2017/09/16/1 http://www.debian.org/security/2017/dsa-3977 https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333 https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 https://github.com/akrennmair/newsbeuter/issues/598 https://usn.ubuntu.com/4585-1 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.8EPSS: 1%CPEs: 13EXPL: 0

The open-in-browser command in newsbeuter before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a feed URL. El comando open-in-browser en newsbeuter versiones anteriores a 1.1 permite a atacantes remotos ejecutar comandos de su elección a través de metacaracteres de consola en una URL fuente. • http://newsbeuter.wordpress.com/2008/09/01/newsbeuter-11-released-contains-security-fix-please-upgrade http://secunia.com/advisories/31676 http://secunia.com/advisories/31995 http://security.gentoo.org/glsa/glsa-200809-12.xml http://www.newsbeuter.org/downloads/CHANGES http://www.openwall.com/lists/oss-security/2008/09/01/4 http://www.securityfocus.com/bid/30964 https://exchange.xforce.ibmcloud.com/vulnerabilities/44791 • CWE-20: Improper Input Validation •