First published: Tue May 11 2021(Updated: )
An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunar | <4.16.7 | |
Thunar | >=4.17.0<4.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2021-32563.
The severity of CVE-2021-32563 is critical with a CVSS score of 9.8.
The affected software is Thunar versions before 4.16.7 and 4.17.x before 4.17.2.
This vulnerability can be exploited by calling Thunar with a regular file as a command-line argument, which delegates to a different program without user confirmation, potentially leading to code execution.
Yes, there are references available for this vulnerability. You can find them at the following links: [Reference 1](http://www.openwall.com/lists/oss-security/2021/05/11/3), [Reference 2](http://www.openwall.com/lists/oss-security/2023/01/05/1), [Reference 3](http://www.openwall.com/lists/oss-security/2023/01/05/2).