CVE-2020-15692
Published: 14 August 2020
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.
Priority
Status
Package | Release | Status |
---|---|---|
nim Launchpad, Ubuntu, Debian |
bionic |
Needed
|
focal |
Needed
|
|
groovy |
Released
(1.2.6-1)
|
|
hirsute |
Released
(1.2.6-1)
|
|
impish |
Released
(1.2.6-1)
|
|
lunar |
Released
(1.2.6-1)
|
|
mantic |
Released
(1.2.6-1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
|
Patches: upstream: https://github.com/nim-lang/Nim/commit/d0a28576751b1b7e8c935ebcb75d44c3d189877e |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |