CVE-2017-17520

NameCVE-2017-17520
Description** DISPUTED ** tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior, because the documentation states "url_handler.pl was designed to work together with tin which only issues shell escaped absolute URLs."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tin (PTS)wheezy1:2.1.1-1vulnerable
jessie1:2.2.1-1vulnerable
buster, sid, stretch1:2.4.1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tinsource(unstable)(unfixed)unimportant

Notes

https://sources.debian.org/src/tin/1:2.4.1-1/tools/url_handler.pl/?hl=120#L120
Documentation has a clear SECURITY section mentioning that [...] url_handler
does not try hard to shell escape its input nor does it convert relative URLs
into abosulte ones. If you use url_handler.pl from other applications be sure to
at least shell escaped its input.

Search for package or bug name: Reporting problems