First published: Thu Dec 14 2017(Updated: )
** DISPUTED ** tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior, because the documentation states "url_handler.pl was designed to work together with tin which only issues shell escaped absolute URLs."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Tin | =2.4.1 | |
debian/tin | <=1:2.4.5-1<=1:2.6.2-1<=1:2.6.4~20240801-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17520 has a moderate severity level as it allows for argument-injection attacks through unvalidated URL handling.
To fix CVE-2017-17520, ensure you are using a version of TIN that is updated beyond 2.4.1 and correctly validates input from the BROWSER environment variable.
CVE-2017-17520 can facilitate argument-injection attacks which may lead to arbitrary command execution via crafted URLs.
CVE-2017-17520 primarily affects TIN version 2.4.1 and earlier versions.
Yes, it has been reported that the behavior leading to CVE-2017-17520 may be intentional, indicating a design choice rather than an oversight.