GHSA-7x48-7466-3g33

Suggest an improvement
Source
https://github.com/advisories/GHSA-7x48-7466-3g33
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-7x48-7466-3g33/GHSA-7x48-7466-3g33.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-7x48-7466-3g33
Aliases
Published
2022-03-18T00:01:11Z
Modified
2024-11-30T05:30:24.792328Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L CVSS Calculator
  • 6.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Command injection in guake
Details

Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of executecommand and executecommandbyuuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Note: Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-03-18T22:40:30Z"
}
References

Affected packages

PyPI / guake

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.5

Affected versions

3.*

3.0.0.0b2
3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.1.0
3.1.1
3.2.0
3.2.1.dev35
3.2.1
3.2.2
3.3.0
3.3.1
3.3.2
3.3.3
3.4.0
3.5.0
3.6.0
3.6.1
3.6.2
3.6.3
3.7.0
3.8.2.0rc2.dev0
3.8.2.0rc3.dev0
3.8.3.dev0
3.8.4.dev0
3.8.5.dev0
3.8.5.0rc2