The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0116 | The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands. |
Github GHSA |
GHSA-7x48-7466-3g33 | Command injection in guake |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T02:12:07.625Z
Reserved: 2021-01-08T00:00:00
Link: CVE-2021-23556
No data.
Status : Modified
Published: 2022-03-17T12:15:07.590
Modified: 2024-11-21T05:51:49.533
Link: CVE-2021-23556
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA