Untrusted search path vulnerability in dash 0.5.4, when used as a login shell, allows local users to execute arbitrary code via a Trojan horse .profile file in the current working directory.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/34092 | vdb entry |
http://www.ubuntu.com/usn/USN-732-1 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49216 | vdb entry |
http://secunia.com/advisories/34205 | third party advisory |