newsbeuter: remote code execution (CVE-2017-14500)
Improper Neutralization of Special Elements used in an OS Command in the
podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9
allows remote
attackers to perform user-assisted code execution by crafting an RSS
item with a media enclosure (i.e., a podcast file) that includes shell
metacharacters in its filename,
related to pb_controller.cpp and queueloader.cpp, a different
vulnerability than CVE-2017-12904.
References:
https://github.com/akrennmair/newsbeuter/issues/598
http://openwall.com/lists/oss-security/2017/09/16/1
(from redmine: issue id 7875, created on 2017-09-21, closed on 2017-10-25)
- Relations:
- child #7876 (closed)
- child #7877 (closed)
- child #7878 (closed)
- child #7879 (closed)
- child #7880 (closed)