Bug 1483363

Summary: [CVE-2017-12904] Remote code execution in newsbeuter
Product: [Fedora] Fedora Reporter: Timo Trinks <ttrinks>
Component: newsbeuterAssignee: Ben Boeckel <fedora>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: urgent Docs Contact:
Priority: unspecified    
Version: 26CC: fedora, jamielinux
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: All   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-31 13:17:53 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Timo Trinks 2017-08-21 00:22:53 UTC
Description of problem:

Jeriko One discovered a vulnerability that allows a remote attacker to execute arbitrary code on your computer.

An attacker can craft an RSS item with shell code in the title and/or URL. When you bookmark such an item, your shell will execute that code. The vulnerability is triggered when bookmark-cmd is called; if you abort bookmarking before that, you're safe.

Version-Release number of selected component (if applicable):

Newsbeuter versions 0.7 through 2.9 are affected.

How reproducible:

Always.

[...]

Additional info:

https://github.com/akrennmair/newsbeuter/issues/591

Comment 1 Andrej Nemec 2017-08-31 13:17:53 UTC

*** This bug has been marked as a duplicate of bug 1484519 ***