tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior, because the documentation states "url_handler.pl was designed to work together with tin which only issues shell escaped absolute URLs.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:51:32.021Z

Reserved: 2017-12-11T00:00:00

Link: CVE-2017-17520

cve-icon Vulnrichment

Updated: 2024-08-05T20:51:32.021Z

cve-icon NVD

Status : Deferred

Published: 2017-12-14T16:29:00.620

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-17520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.