8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
busybox is vulnerable to arbitrary code execution. The vulnerability exists in the add_match
function in libbb/lineedit.c
in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to get a list of filenames in a directory, does not sanitize filenames and results in executing any escape sequence in the terminal. This could potentially result in code execution, arbitrary file writes, or other attacks.
packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
packetstormsecurity.com/files/154536/VMware-Security-Advisory-2019-0013.html
packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
seclists.org/fulldisclosure/2019/Jun/18
seclists.org/fulldisclosure/2019/Sep/7
seclists.org/fulldisclosure/2020/Aug/20
seclists.org/fulldisclosure/2020/Mar/15
seclists.org/fulldisclosure/2020/Sep/6
seclists.org/fulldisclosure/2021/Aug/21
seclists.org/fulldisclosure/2021/Jan/39
seclists.org/fulldisclosure/2022/Jun/36
www.vmware.com/security/advisories/VMSA-2019-0013.html
git.busybox.net/busybox/commit/?id=c3797d40a1c57352192c6106cc0f435e7d9c11e8
lists.debian.org/debian-lts-announce/2018/07/msg00037.html
lists.debian.org/debian-lts-announce/2021/02/msg00020.html
seclists.org/bugtraq/2019/Jun/14
seclists.org/bugtraq/2019/Sep/7
us-cert.cisa.gov/ics/advisories/icsa-20-240-01
usn.ubuntu.com/3935-1/
www.twistlock.com/2017/11/20/cve-2017-16544-busybox-autocompletion-vulnerability/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P