← Zuruck zu CVEs
CVE-2020-15167
HIGH8.2
Beschreibung
In Miller (command line utility) using the configuration file support introduced in version 5.9.0, it is possible for an attacker to cause Miller to run arbitrary code by placing a malicious `.mlrrc` file in the working directory. See linked GitHub Security Advisory for complete details. A fix is ready and will be released as Miller 5.9.1.
CVE Details
CVSS v3.1 Bewertung8.2
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht9/2/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
johnkerl:miller
Schwachen (CWE)
CWE-94CWE-427
Referenzen
https://github.com/johnkerl/miller/security/advisories/GHSA-mw2v-4q78-j2cw(security-advisories@github.com)
https://github.com/johnkerl/miller/security/advisories/GHSA-mw2v-4q78-j2cw(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.