Vulnerability CVE-2010-0011


Published: 2010-02-25   Modified: 2012-02-13

Description:
The eval_js function in uzbl-core.c in Uzbl before 2010.01.05 exposes the run method of the Uzbl object, which allows remote attackers to execute arbitrary commands via JavaScript code.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
UZBL -> UZBL 

 References:
http://github.com/Dieterbe/uzbl/downloads
http://xforce.iss.net/xforce/xfdb/56612
http://www.uzbl.org/news.php?id=22
http://www.openwall.com/lists/oss-security/2010/01/06/3
http://www.openwall.com/lists/oss-security/2010/01/06/1
http://lists.uzbl.org/pipermail/uzbl-dev-uzbl.org/2010-January/000586.html
http://github.com/Dieterbe/uzbl/commit/1958b52d41cba96956dc1995660de49525ed1047

Copyright 2024, cxsecurity.com

 

Back to Top