7.8
CVSSv3

CVE-2017-16667

Published: 08/11/2017 Updated: 30/04/2019
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

backintime (aka Back in Time) prior to 1.1.24 did improper escaping/quoting of file paths used as arguments to the 'notify-send' command, leading to some parts of file paths being executed as shell commands within an os.system call in qt4/plugins/notifyplugin.py. This could allow an malicious user to craft an unreadable file with a specific name to run arbitrary shell commands.

Vulnerable Product Search on Vulmon Subscribe to Product

backintime project backintime

Vendor Advisories

Debian Bug report logs - #881205 backintime: CVE-2017-16667: shell injection in notify-send Package: src:backintime; Maintainer for src:backintime is Jonathan Wiltshire <jmw@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 8 Nov 2017 20:03:01 UTC Severity: grave Tags: fixed-upstream, pat ...