In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/browsers.nim#L48 | third party advisory patch |
https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html | third party advisory release notes |
http://www.openwall.com/lists/oss-security/2021/02/04/1 | mailing list exploit third party advisory |
https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/ | third party advisory exploit |