First published: Mon Dec 11 2017(Updated: )
lilypond-invoke-editor in LilyPond 2.19.80 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
LilyPond | =2.19.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-17523 is classified as high with a score of 8.8.
To fix CVE-2017-17523, ensure you update to a later version of LilyPond that includes mitigations for this vulnerability.
CVE-2017-17523 mainly allows remote attackers to conduct argument-injection attacks via crafted URLs.
The affected version by CVE-2017-17523 is LilyPond 2.19.80.
CVE-2017-17523 is a vulnerability stemming from the lack of validation of strings before executing commands based on the BROWSER environment variable.