CVE-2021-23556

high

Description

The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.

References

https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334

https://github.com/Guake/guake/releases

https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888

https://github.com/Guake/guake/pull/2017

https://github.com/Guake/guake/issues/1796

Details

Source: Mitre, NVD

Published: 2022-03-17

Updated: 2022-03-23

Risk Information

CVSS v2

Base Score: 6

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Severity: High