Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-15271
HistoryOct 26, 2020 - 6:10 p.m.

CVE-2020-15271 Shell Command Execution in lookatme

2020-10-2618:10:36
CWE-78
GitHub_M
www.cve.org

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

9.2 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.1%

In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically loaded the built-in “terminal” and “file_loader” extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. This is fixed in version 2.3.0. As a workaround, the lookatme/contrib/terminal.py and lookatme/contrib/file_loader.py files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme.

CNA Affected

[
  {
    "product": "lookatme",
    "vendor": "d0c-s4vage",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.3.0"
      }
    ]
  }
]

9.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

9.2 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.1%