The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022.
References
Link | Resource |
---|---|
https://github.com/spesmilo/electrum/issues/3678 | Exploit Issue Tracking Third Party Advisory |
https://github.com/spesmilo/electrum/pull/3700 | Third Party Advisory |
https://github.com/spesmilo/electrum/issues/3678 | Exploit Issue Tracking Third Party Advisory |
https://github.com/spesmilo/electrum/pull/3700 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/spesmilo/electrum/issues/3678 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/spesmilo/electrum/pull/3700 - Third Party Advisory |
Information
Published : 2018-01-27 15:29
Updated : 2024-11-21 04:10
NVD link : CVE-2018-6353
Mitre link : CVE-2018-6353
CVE.ORG link : CVE-2018-6353
JSON object : View
Products Affected
electrum
- electrum
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')