CVE-2020-15692

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15692
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15692.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-15692
Related
Published
2020-08-14T19:15:12Z
Modified
2024-10-12T06:13:39.060663Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.

References

Affected packages

Debian:11 / nim

Package

Name
nim
Purl
pkg:deb/debian/nim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / nim

Package

Name
nim
Purl
pkg:deb/debian/nim?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/nim-lang/nim

Affected ranges

Type
GIT
Repo
https://github.com/nim-lang/nim
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.10.2
v0.11.0
v0.11.2
v0.12.0
v0.13.0
v0.14.0
v0.14.2
v0.15.0
v0.15.2
v0.16.0
v0.17.0
v0.17.2
v0.18.0
v0.19.0
v0.20.0
v0.8.14
v0.9.0
v0.9.2
v0.9.4
v0.9.6

v1.*

v1.0.0
v1.2.0
v1.2.2
v1.2.4
v1.2.6