CVE-2022-23465

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23465
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23465.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23465
Aliases
Published
2022-12-02T23:15:16Z
Modified
2024-05-15T01:15:36.423267Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

SwiftTerm is a Xterm/VT100 Terminal emulator. Prior to commit a94e6b24d24ce9680ad79884992e1dff8e150a31, an attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. Version a94e6b24d24ce9680ad79884992e1dff8e150a31 contains a patch for this issue. There are no known workarounds available.

References

Affected packages

Git / github.com/migueldeicaza/swiftterm

Affected ranges

Type
GIT
Repo
https://github.com/migueldeicaza/swiftterm
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.7