// For flags

CVE-2007-2027

ELinks Relative 0.10.6/011.1 - Path Arbitrary Code Execution

Severity Score

4.4
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks.

Una vulnerabilidad de ruta (path) de búsqueda no confiable en la función add_filename_to_string en el archivo intl/gettext/loadmsgcat.c para Elinks versión 0.11.1, permite a usuarios locales causar que Elinks use un catálogo de mensajes gettext no confiable (archivo .po) en un directorio "../po", que puede ser aprovechado para conducir ataques de cadena de formato.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-04-13 CVE Reserved
  • 2007-04-13 CVE Published
  • 2007-05-07 First Exploit
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-134: Use of Externally-Controlled Format String
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Elinks
Search vendor "Elinks"
Elinks
Search vendor "Elinks" for product "Elinks"
0.11.1
Search vendor "Elinks" for product "Elinks" and version "0.11.1"
-
Affected