CVE-2017-14500

Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its filename, related to pb_controller.cpp and queueloader.cpp, a different vulnerability than CVE-2017-12904.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:newsbeuter:newsbeuter:0.3:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.4:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.5:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.6:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.7:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.8:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.9:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:1.0:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:1.1:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:1.2:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:1.3:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.0:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.1:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.2:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.3:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.4:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.5:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.6:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.7:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.8:*:*:*:*:*:*:*
cpe:2.3:a:newsbeuter:newsbeuter:2.9:*:*:*:*:*:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () http://openwall.com/lists/oss-security/2017/09/16/1 - Mailing List, Third Party Advisory () http://openwall.com/lists/oss-security/2017/09/16/1 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3977 - () http://www.debian.org/security/2017/dsa-3977 -
References () https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333 - Patch () https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333 - Patch
References () https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 - Patch () https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260 - Patch
References () https://github.com/akrennmair/newsbeuter/issues/598 - Issue Tracking, Vendor Advisory () https://github.com/akrennmair/newsbeuter/issues/598 - Issue Tracking, Vendor Advisory
References () https://usn.ubuntu.com/4585-1/ - () https://usn.ubuntu.com/4585-1/ -

Information

Published : 2017-09-17 05:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14500

Mitre link : CVE-2017-14500

CVE.ORG link : CVE-2017-14500


JSON object : View

Products Affected

newsbeuter

  • newsbeuter
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')