sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
https://usn.ubuntu.com/3584-1/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2017/12/msg00012.html | mailing list |
http://metadata.ftp-master.debian.org/changelogs/main/s/sensible-utils/sensible-utils_0.0.11_changelog | release notes vendor advisory |
https://bugs.debian.org/881767 | third party advisory issue tracking exploit |
https://www.debian.org/security/2017/dsa-4071 | vendor advisory third party advisory issue tracking |