Name | CVE-2017-17520 |
Description | tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior, because the documentation states "url_handler.pl was designed to work together with tin which only issues shell escaped absolute URLs. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tin (PTS) | bullseye | 1:2.4.5-1 | vulnerable |
| bookworm | 1:2.6.2-1 | vulnerable |
| sid, trixie | 1:2.6.4~20241128-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tin | source | (unstable) | (unfixed) | unimportant | | |
Notes
https://sources.debian.org/src/tin/1:2.4.1-1/tools/url_handler.pl/?hl=120#L120
Documentation has a clear SECURITY section mentioning that [...] url_handler
does not try hard to shell escape its input nor does it convert relative URLs
into abosulte ones. If you use url_handler.pl from other applications be sure to
at least shell escaped its input.