CVE-2017-16667
Current Description
backintime (aka Back in Time) before 1.1.24 did improper escaping/quoting of file paths used as arguments to the 'notify-send' command, leading to some parts of file paths being executed as shell commands within an os.system call in qt4/plugins/notifyplugin.py. This could allow an attacker to craft an unreadable file with a specific name to run arbitrary shell commands.
Basic Data
Published | November 08, 2017 |
Last Modified | April 30, 2019 |
Assigner | cve@mitre.org |
Data Type | CVE |
Data Format | MITRE |
Data Version | 4.0 |
Problem Type | CWE-78 |
CVE Data Version | 4.0 |
Base Metric V2
CVSS 2 - Version | 2.0 |
CVSS 2 - Vector String | AV:N/AC:M/Au:N/C:C/I:C/A:C |
CVSS 2 - Access Vector | NETWORK |
CVSS 2 - Access Complexity | MEDIUM |
CVSS 2 - Authentication | NONE |
CVSS 2 - Confidentiality Impact | COMPLETE |
CVSS 2 - Availability Impact | COMPLETE |
CVSS 2 - Base Score | 9.3 |
Severity | HIGH |
Exploitability Score | 8.6 |
Impact Score | 10.0 |
Obtain All Privilege | false |
Obtain User Privilege | false |
Obtain Other Privilege | false |
Base Metric V3
CVSS 3 - Version | 3.0 |
CVSS 3 - Vector String | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CVSS 3 - Attack Vector | LOCAL |
CVSS 3 - Attack Complexity | LOW |
CVSS 3 - Privileges Required | NONE |
CVSS 3 - User Interaction | REQUIRED |
CVSS 3 - Scope | UNCHANGED |
CVSS 3 - Confidentiality Impact | HIGH |
CVSS 3 - Integrity Impact | HIGH |
CVSS 3 - Availability Impact | HIGH |
CVSS 3 - Base Score | 7.8 |
CVSS 3 - Base Severity | HIGH |
Exploitability Score | 1.8 |
Base Severity | HIGH |
Configurations
-
OR - Configuration 1
Cpe Version | Part | Vendor | Product | Version | Update | Edition | Language | SW Edition | Target SW | Target HW | Other | Version Start Including | Version End Including | Version Start Excluding | Version End Excluding |
2.3 | Application | Backintime Project | Backintime | * | * | * | * | * | * | * | * | |