PYSEC-2022-165

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/guake/PYSEC-2022-165.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2022-165
Aliases
Published
2022-03-17T12:15:00Z
Modified
2023-11-01T04:54:41.430006Z
Summary
[none]
Details

The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of executecommand and executecommandbyuuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. Note: Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

References

Affected packages

PyPI / guake

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.5

Affected versions

3.*

3.0.0.0b2
3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.1.0
3.1.1
3.2.0
3.2.1.dev35
3.2.1
3.2.2
3.3.0
3.3.1
3.3.2
3.3.3
3.4.0
3.5.0
3.6.0
3.6.1
3.6.2
3.6.3
3.7.0
3.8.2.0rc2.dev0
3.8.2.0rc3.dev0
3.8.3.dev0
3.8.4.dev0
3.8.5.dev0
3.8.5.0rc2