CVE-2018-6353

The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022.
References
Link Resource
https://github.com/spesmilo/electrum/issues/3678 Exploit Issue Tracking Third Party Advisory
https://github.com/spesmilo/electrum/pull/3700 Third Party Advisory
https://github.com/spesmilo/electrum/issues/3678 Exploit Issue Tracking Third Party Advisory
https://github.com/spesmilo/electrum/pull/3700 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:electrum:electrum:*:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:electrum:electrum:3.0.5:*:*:*:*:*:*:*

History

21 Nov 2024, 04:10

Type Values Removed Values Added
References () https://github.com/spesmilo/electrum/issues/3678 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/spesmilo/electrum/issues/3678 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/spesmilo/electrum/pull/3700 - Third Party Advisory () https://github.com/spesmilo/electrum/pull/3700 - Third Party Advisory

Information

Published : 2018-01-27 15:29

Updated : 2024-11-21 04:10


NVD link : CVE-2018-6353

Mitre link : CVE-2018-6353

CVE.ORG link : CVE-2018-6353


JSON object : View

Products Affected

electrum

  • electrum
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')