CVE-2020-15167

In Miller (command line utility) using the configuration file support introduced in version 5.9.0, it is possible for an attacker to cause Miller to run arbitrary code by placing a malicious `.mlrrc` file in the working directory. See linked GitHub Security Advisory for complete details. A fix is ready and will be released as Miller 5.9.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:johnkerl:miller:5.9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:04

Type Values Removed Values Added
References () https://github.com/johnkerl/miller/security/advisories/GHSA-mw2v-4q78-j2cw - Exploit, Third Party Advisory () https://github.com/johnkerl/miller/security/advisories/GHSA-mw2v-4q78-j2cw - Exploit, Third Party Advisory
CVSS v2 : 4.4
v3 : 8.6
v2 : 4.4
v3 : 8.2

Information

Published : 2020-09-02 18:15

Updated : 2024-11-21 05:04


NVD link : CVE-2020-15167

Mitre link : CVE-2020-15167

CVE.ORG link : CVE-2020-15167


JSON object : View

Products Affected

johnkerl

  • miller
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-427

Uncontrolled Search Path Element