Description
tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior, because the documentation states "url_handler.pl was designed to work together with tin which only issues shell escaped absolute URLs.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://security-tracker.debian.org/tracker/CVE-2017-17520 |
|
History
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:51:32.021Z
Reserved: 2017-12-11T00:00:00.000Z
Link: CVE-2017-17520
Updated: 2024-08-05T20:51:32.021Z
Status : Deferred
Published: 2017-12-14T16:29:00.620
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-17520
No data.
OpenCVE Enrichment
No data.
Weaknesses