Description
VTE, as used by default in gnome-terminal terminal emulator 2.2 and as an option in gnome-terminal 2.0, allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4 Affected Packages4 packages
🔴Vulnerability Details
4GHSAGHSA-h3vh-54q4-255x: The vte_sequence_handler_window_manipulation function in vteseq↗2022-05-17 ▶ GHSAGHSA-mv26-jcw9-w5v8: VTE, as used by default in gnome-terminal terminal emulator 2↗2022-04-29 ▶ OSVCVE-2010-2713: The vte_sequence_handler_window_manipulation function in vteseq↗2010-08-05 ▶ OSVCVE-2003-0070: VTE, as used by default in gnome-terminal terminal emulator 2↗2003-03-03 ▶ 💥Exploits & PoCs
1Exploit-DBApache 0.8.x/1.0.x / NCSA HTTPd 1.x - 'test-cgi' Directory Listing↗1996-04-01 ▶ 📋Vendor Advisories
4Red Hatvte: responds to get window title escape sequence request↗2010-07-15 ▶ DebianCVE-2010-2713: vte - The vte_sequence_handler_window_manipulation function in vteseq.c in libvte (aka...↗2010 ▶ DebianCVE-2003-0070: vte - VTE, as used by default in gnome-terminal terminal emulator 2.2 and as an option...↗2003 ▶ 💬Community
2BugzillaCVE-2003-0070 security flaw↗2018-08-16 ▶ BugzillaCVE-2010-2713 vte: responds to get window title escape sequence request↗2010-07-09 ▶