CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
69.2%
The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method
or Function due to the exposure of execute_command and
execute_command_by_uuid methods via the d-bus interface, which makes it
possible for a malicious user to run an arbitrary command via the d-bus
method. Note: Exploitation requires the user to have installed another
malicious program that will be able to send dbus signals or run terminal
commands.
github.com/Guake/guake/issues/1796
github.com/Guake/guake/pull/2017
github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888
github.com/Guake/guake/releases
launchpad.net/bugs/cve/CVE-2021-23556
nvd.nist.gov/vuln/detail/CVE-2021-23556
security-tracker.debian.org/tracker/CVE-2021-23556
snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334
www.cve.org/CVERecord?id=CVE-2021-23556
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
69.2%