Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:topydo:topydo:-:*:*:*:*:*:*:*", "matchCriteriaId": "2234A890-2E08-41E4-A2DB-0576126978C0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line.."}, {"lang": "es", "value": "topydo contiene una vulnerabilidad CWE-20: validaci\u00f3n de entradas incorrecta en ListFormatParser::parse, en la l\u00ednea 292 del archivo topydo/lib/ListFormat.py en el commit d4f843dac71308b2f29a7c2cdc76f055c3841523 que puede resultar en la inyecci\u00f3n de bytes arbitrarios en el terminal, incluyendo las secuencias de c\u00f3digo de escape. Parece ser que este ataque puede ser explotado mediante una v\u00edctima que abra un archivo todo.txt con, al menos, una l\u00ednea especialmente manipulada."}], "id": "CVE-2018-1000523", "lastModified": "2024-11-21T03:40:06.907", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-06-26T16:29:01.447", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://github.com/bram85/topydo/issues/240"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://github.com/bram85/topydo/issues/240"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "nvd@nist.gov", "type": "Primary"}]}