ID CVE-2014-2093
Summary Untrusted search path vulnerability in Catfish through 0.4.0.3 allows local users to gain privileges via a Trojan horse catfish.py in the current working directory. Per: http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"
References
Vulnerable Configurations
  • cpe:2.3:a:catfish_project:catfish:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:catfish_project:catfish:0.4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:catfish_project:catfish:0.4.0.3:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 11-03-2014 - 16:57)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm
mlist [oss-security] 20140225 Re: CVE request for catfish program
Last major update 11-03-2014 - 16:57
Published 26-02-2014 - 14:55
Last modified 11-03-2014 - 16:57
Back to Top