UBUNTU-CVE-2023-32637

Source
https://ubuntu.com/security/CVE-2023-32637
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-32637.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-32637
Related
Published
2023-07-25T06:15:00Z
Modified
2025-01-13T10:24:21Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

GBrowse accepts files with any formats uploaded and places them in the area accessible through unauthenticated web requests. Therefore, anyone who can upload files through the product may execute arbitrary code on the server.

References

Affected packages

Ubuntu:Pro:16.04:LTS / gbrowse

Package

Name
gbrowse
Purl
pkg:deb/ubuntu/gbrowse@2.54+dfsg-6build1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.54+dfsg-5
2.54+dfsg-6
2.54+dfsg-6build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "This has a high priority because it is a vulnerability that allows a remote attacker to execute code in a machine, and it looks to be easily exploitable given that it involves regular functionalities provided by the application."
}

Ubuntu:20.04:LTS / gbrowse

Package

Name
gbrowse
Purl
pkg:deb/ubuntu/gbrowse@2.56+dfsg-8?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.56+dfsg-8

Affected versions

2.*

2.56+dfsg-4
2.56+dfsg-4build1
2.56+dfsg-5
2.56+dfsg-6
2.56+dfsg-7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "2.56+dfsg-8",
            "binary_name": "gbrowse"
        },
        {
            "binary_version": "2.56+dfsg-8",
            "binary_name": "gbrowse-calign"
        },
        {
            "binary_version": "2.56+dfsg-8",
            "binary_name": "gbrowse-calign-dbgsym"
        },
        {
            "binary_version": "2.56+dfsg-8",
            "binary_name": "gbrowse-data"
        }
    ],
    "priority_reason": "This has a high priority because it is a vulnerability that allows a remote attacker to execute code in a machine, and it looks to be easily exploitable given that it involves regular functionalities provided by the application."
}

Ubuntu:24.04:LTS / gbrowse

Package

Name
gbrowse
Purl
pkg:deb/ubuntu/gbrowse@2.56+dfsg-11?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.56+dfsg-11

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "2.56+dfsg-11",
            "binary_name": "gbrowse"
        },
        {
            "binary_version": "2.56+dfsg-11",
            "binary_name": "gbrowse-calign"
        },
        {
            "binary_version": "2.56+dfsg-11",
            "binary_name": "gbrowse-calign-dbgsym"
        },
        {
            "binary_version": "2.56+dfsg-11",
            "binary_name": "gbrowse-data"
        }
    ],
    "priority_reason": "This has a high priority because it is a vulnerability that allows a remote attacker to execute code in a machine, and it looks to be easily exploitable given that it involves regular functionalities provided by the application."
}