9.3
CVSSv2

CVE-2020-15271

Published: 26/10/2020 Updated: 13/11/2020
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

In lookatme (python/pypi package) versions before 2.3.0, the package automatically loaded the built-in "terminal" and "file_loader" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

lookatme project lookatme

Vendor Advisories

Debian Bug report logs - #972988 lookatme: CVE-2020-15271 Package: src:lookatme; Maintainer for src:lookatme is Reiner Herrmann <reiner@reiner-hde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 26 Oct 2020 21:15:01 UTC Severity: grave Tags: security, upstream Found in version lookatme/120-1 Fi ...