Vulnerabilites related to iTerm2 - iTerm2
cve-2023-46321
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-11 20:35
Severity ?
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:41.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "iterm2",
            "vendor": "iterm2",
            "versions": [
              {
                "lessThan": "3.5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46321",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-11T20:20:40.720607Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-117",
                "description": "CWE-117 Improper Output Neutralization for Logs",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T20:35:41.935Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T23:53:31.541867",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46321",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-11T20:35:41.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-9535
Vulnerability from cvelistv5
Published
2019-10-09 19:15
Modified
2024-09-17 02:11
Severity ?
Summary
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
Impacted products
Vendor Product Version
iTerm2 iTerm2 Version: 3.3.5   <
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:44.484Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#763073",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://kb.cert.org/vuls/id/763073/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iTerm2",
          "vendor": "iTerm2",
          "versions": [
            {
              "lessThanOrEqual": "3.3.5",
              "status": "affected",
              "version": "3.3.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Thanks to Stefan Gr\u00f6nke and Fabian Freyer of Radically Open Security for finding this vulnerability, the Mozilla Open Source Support (MOSS) project for supporting the audit, and George Nachman of iTerm2 for developing the fix, and all parties for coordinating this vulnerability."
        }
      ],
      "datePublic": "2019-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability exists in the way that iTerm2 integrates with tmux\u0027s control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim\u0027s computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-349",
              "description": "CWE-349",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-09T19:15:44",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#763073",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://kb.cert.org/vuls/id/763073/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution",
      "workarounds": [
        {
          "lang": "en",
          "value": "Update iTerm2 to version 3.3.6, which includes mitigations against exploitation of this vulnerability."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.8"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2019-10-09T04:00:00.000Z",
          "ID": "CVE-2019-9535",
          "STATE": "PUBLIC",
          "TITLE": "iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iTerm2",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "3.3.5",
                            "version_value": "3.3.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "iTerm2"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Thanks to Stefan Gr\u00f6nke and Fabian Freyer of Radically Open Security for finding this vulnerability, the Mozilla Open Source Support (MOSS) project for supporting the audit, and George Nachman of iTerm2 for developing the fix, and all parties for coordinating this vulnerability."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability exists in the way that iTerm2 integrates with tmux\u0027s control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim\u0027s computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.8"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-349"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#763073",
              "refsource": "CERT-VN",
              "url": "https://kb.cert.org/vuls/id/763073/"
            },
            {
              "name": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/",
              "refsource": "MISC",
              "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
            },
            {
              "name": "https://groups.google.com/forum/#!topic/iterm2-discuss/57k_AuLdQa4",
              "refsource": "CONFIRM",
              "url": "https://groups.google.com/forum/#!topic/iterm2-discuss/57k_AuLdQa4"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Update iTerm2 to version 3.3.6, which includes mitigations against exploitation of this vulnerability."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2019-9535",
    "datePublished": "2019-10-09T19:15:44.101481Z",
    "dateReserved": "2019-03-01T00:00:00",
    "dateUpdated": "2024-09-17T02:11:00.076Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-46301
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-12 17:48
Severity ?
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:40.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/news.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46301",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-12T17:48:41.039655Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:48:57.452Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T03:47:50.244689",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
        },
        {
          "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
        },
        {
          "url": "https://iterm2.com/news.html"
        },
        {
          "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46301",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-12T17:48:57.452Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-46300
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-12 17:49
Severity ?
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:40.846Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/news.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46300",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-12T17:49:29.200906Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:49:38.677Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T03:48:15.545771",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
        },
        {
          "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
        },
        {
          "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
        },
        {
          "url": "https://iterm2.com/news.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46300",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-12T17:49:38.677Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2025-22275
Vulnerability from cvelistv5
Published
2025-01-03 00:00
Modified
2025-01-03 14:58
Severity ?
Summary
iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation.
Impacted products
Vendor Product Version
iTerm2 iTerm2 Version: 3.5.6   
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-22275",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-03T14:58:43.443113Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-03T14:58:54.733Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "iTerm2",
          "vendor": "iTerm2",
          "versions": [
            {
              "lessThan": "3.5.11",
              "status": "affected",
              "version": "3.5.6",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "3.5.11",
                  "versionStartIncluding": "3.5.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "CWE-532 Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-03T06:23:55.308681Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog"
        },
        {
          "url": "https://news.ycombinator.com/item?id=42579472"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/wikis/SSH-Integration-Information-Leak"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-22275",
    "datePublished": "2025-01-03T00:00:00",
    "dateReserved": "2025-01-03T00:00:00",
    "dateUpdated": "2025-01-03T14:58:54.733Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-9231
Vulnerability from cvelistv5
Published
2017-09-20 20:00
Modified
2024-09-16 17:23
Severity ?
Summary
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:43:41.676Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://news.ycombinator.com/item?id=15286956"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-20T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://news.ycombinator.com/item?id=15286956"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-9231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/6050",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/5303",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
            },
            {
              "name": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51",
              "refsource": "MISC",
              "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
            },
            {
              "name": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522",
              "refsource": "MISC",
              "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/6068",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/3688",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
            },
            {
              "name": "https://news.ycombinator.com/item?id=15286956",
              "refsource": "MISC",
              "url": "https://news.ycombinator.com/item?id=15286956"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-9231",
    "datePublished": "2017-09-20T20:00:00Z",
    "dateReserved": "2017-09-20T00:00:00Z",
    "dateUpdated": "2024-09-16T17:23:28.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-46322
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-11 20:28
Severity ?
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:41.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "iterm2",
            "vendor": "iterm2",
            "versions": [
              {
                "lessThan": "3.5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46322",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-11T20:14:29.861746Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-117",
                "description": "CWE-117 Improper Output Neutralization for Logs",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T20:28:05.384Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname\u0027s initial character may be non-alphanumeric. The hostname\u0027s other characters may be outside the set of alphanumeric characters, dash, and period."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T23:53:11.890070",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46322",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-11T20:28:05.384Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-45872
Vulnerability from cvelistv5
Published
2022-11-23 00:00
Modified
2024-08-03 14:24
Severity ?
Summary
iTerm2 before 3.4.18 mishandles a DECRQSS response.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:24:03.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 before 3.4.18 mishandles a DECRQSS response."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-23T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-45872",
    "datePublished": "2022-11-23T00:00:00",
    "dateReserved": "2022-11-23T00:00:00",
    "dateUpdated": "2024-08-03T14:24:03.207Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-19022
Vulnerability from cvelistv5
Published
2019-11-17 10:59
Modified
2024-08-05 02:02
Severity ?
Summary
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:02:39.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-17T10:59:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-19022",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/8491",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-19022",
    "datePublished": "2019-11-17T10:59:09",
    "dateReserved": "2019-11-17T00:00:00",
    "dateUpdated": "2024-08-05T02:02:39.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2023-10-22 04:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5A8378-60FE-4F69-A7AA-DEE9393C51C8",
              "versionEndExcluding": "3.4.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration."
    },
    {
      "lang": "es",
      "value": "iTerm2 anterior a 3.4.20 permite la ejecuci\u00f3n de c\u00f3digo (potencialmente remota) debido al mal manejo de ciertas secuencias de escape relacionadas con la integraci\u00f3n de tmux."
    }
  ],
  "id": "CVE-2023-46300",
  "lastModified": "2024-11-21T08:28:15.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-22T04:15:09.740",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-116"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-17 18:15
Modified
2024-11-21 04:34
Summary
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CA7E37-00B5-4EDE-A96B-83A127175E0E",
              "versionEndIncluding": "3.3.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories."
    },
    {
      "lang": "es",
      "value": "iTerm2 versiones hasta 3.3.6, posee una documentaci\u00f3n potencialmente insuficiente sobre la presencia del historial de b\u00fasqueda en com.googlecode.iterm2.plist, lo que podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n confidencial, como es demostrado mediante la b\u00fasqueda de la cadena NoSyncSearchHistory en archivos .plist en repositorios de Git p\u00fablicos."
    }
  ],
  "id": "CVE-2019-19022",
  "lastModified": "2024-11-21T04:34:00.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-17T18:15:11.503",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-23 22:15
Modified
2024-11-21 07:29
Severity ?
Summary
iTerm2 before 3.4.18 mishandles a DECRQSS response.
References
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "392A1214-B460-4D3F-8882-0BF8D4660185",
              "versionEndExcluding": "3.4.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 before 3.4.18 mishandles a DECRQSS response."
    },
    {
      "lang": "es",
      "value": "iTerm2 en versiones anteriores a la 3.4.18 maneja mal una respuesta DECRQSS."
    }
  ],
  "id": "CVE-2022-45872",
  "lastModified": "2024-11-21T07:29:52.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-23T22:15:09.937",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-10-09 20:15
Modified
2024-11-21 04:51
Severity ?
Summary
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1132D3C-F86C-4FC1-ABF4-E1B43EB206F9",
              "versionEndIncluding": "3.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability exists in the way that iTerm2 integrates with tmux\u0027s control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim\u0027s computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad en la manera en que iTerm2 se integra con el modo de control de tmux, lo que puede permitir a un atacante ejecutar comandos arbitrarios al proporcionar una salida maliciosa al terminal. Esto afecta a versiones de iTerm2 hasta 3.3.5 incluy\u00e9ndola. Esta vulnerabilidad puede permitir a un atacante ejecutar comandos arbitrarios en la computadora de su v\u00edctima al proporcionar una salida maliciosa al terminal. Podr\u00eda ser explotada utilizando recursos de la l\u00ednea de comandos que imprimen contenido controlado por el atacante."
    }
  ],
  "id": "CVE-2019-9535",
  "lastModified": "2024-11-21T04:51:48.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-10-09T20:15:33.363",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
    },
    {
      "source": "cret@cert.org",
      "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://kb.cert.org/vuls/id/763073/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://kb.cert.org/vuls/id/763073/"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-349"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-23 00:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period.
Impacted products
Vendor Product Version
iterm2 iterm2 *
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCBDFA5-07B5-4D12-95A7-EE26C15F0CCE",
              "versionEndIncluding": "3.4.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "37F1A1C2-AA8A-45A2-BCC7-36289E434567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "A632C6D5-2180-4B02-B8F1-EBE4442C1BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8A35ECC8-B179-449F-97D7-47017B89E269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E238E921-DEC6-470E-94C3-9ACFCAE47C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "13D2A7C5-650D-456D-97E0-79D146657A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "E67A594B-4ECA-4189-9C3A-08AF188F82DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "62D4145E-8CAA-439D-B917-BE332800EEC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "5622F6B3-ECFC-44D7-AD72-1EBE28E8889D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "E81D1628-8B0A-4DC8-B176-6A2827D91F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4F001-2578-46FE-996F-82DCB5DF3511",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname\u0027s initial character may be non-alphanumeric. The hostname\u0027s other characters may be outside the set of alphanumeric characters, dash, and period."
    },
    {
      "lang": "es",
      "value": "iTermSessionLauncher.m en iTerm2 anterior a 3.5.0beta12 no sanitiza los nombres de host ssh en las URL. El car\u00e1cter inicial del nombre de host puede no ser alfanum\u00e9rico. Los dem\u00e1s caracteres del nombre de host pueden estar fuera del conjunto de caracteres alfanum\u00e9ricos, guiones y puntos."
    }
  ],
  "id": "CVE-2023-46322",
  "lastModified": "2024-11-21T08:28:18.157",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-23T00:15:08.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-117"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-23 00:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
Impacted products
Vendor Product Version
iterm2 iterm2 *
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCBDFA5-07B5-4D12-95A7-EE26C15F0CCE",
              "versionEndIncluding": "3.4.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "37F1A1C2-AA8A-45A2-BCC7-36289E434567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "A632C6D5-2180-4B02-B8F1-EBE4442C1BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8A35ECC8-B179-449F-97D7-47017B89E269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E238E921-DEC6-470E-94C3-9ACFCAE47C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "13D2A7C5-650D-456D-97E0-79D146657A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "E67A594B-4ECA-4189-9C3A-08AF188F82DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "62D4145E-8CAA-439D-B917-BE332800EEC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "5622F6B3-ECFC-44D7-AD72-1EBE28E8889D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "E81D1628-8B0A-4DC8-B176-6A2827D91F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4F001-2578-46FE-996F-82DCB5DF3511",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line."
    },
    {
      "lang": "es",
      "value": "iTermSessionLauncher.m en iTerm2 anterior a 3.5.0beta12 no sanitiza las rutas en las URL de la p\u00e1gina de manual x. Pueden tener metacaracteres de shell para una l\u00ednea de comando /usr/bin/man."
    }
  ],
  "id": "CVE-2023-46321",
  "lastModified": "2024-11-21T08:28:17.990",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-23T00:15:08.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-117"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-22 04:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5A8378-60FE-4F69-A7AA-DEE9393C51C8",
              "versionEndExcluding": "3.4.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload."
    },
    {
      "lang": "es",
      "value": "iTerm2 anterior a 3.4.20 permite la ejecuci\u00f3n de c\u00f3digo (potencialmente remota) debido al mal manejo de ciertas secuencias de escape relacionadas con la carga."
    }
  ],
  "id": "CVE-2023-46301",
  "lastModified": "2024-11-21T08:28:15.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-22T04:15:09.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-116"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-09-20 20:29
Modified
2024-11-21 02:40
Summary
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
References
cve@mitre.orghttps://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51Third Party Advisory
cve@mitre.orghttps://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/3688Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/5303Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/6050Exploit, Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/6068Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/wikis/dnslookupissueThird Party Advisory
cve@mitre.orghttps://news.ycombinator.com/item?id=15286956Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/3688Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/5303Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/6050Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/6068Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/wikis/dnslookupissueThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=15286956Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
iterm2 iterm2 2.9.20151111
iterm2 iterm2 2.9.20151229
iterm2 iterm2 2.9.20160102
iterm2 iterm2 2.9.20160113
iterm2 iterm2 2.9.20160206
iterm2 iterm2 2.9.20160313
iterm2 iterm2 2.9.20160422
iterm2 iterm2 2.9.20160426
iterm2 iterm2 2.9.20160510
iterm2 iterm2 2.9.20160523
iterm2 iterm2 3.0.0
iterm2 iterm2 3.0.0
iterm2 iterm2 3.0.1
iterm2 iterm2 3.0.2
iterm2 iterm2 3.0.3
iterm2 iterm2 3.0.4
iterm2 iterm2 3.0.5
iterm2 iterm2 3.0.6
iterm2 iterm2 3.0.7
iterm2 iterm2 3.0.8
iterm2 iterm2 3.0.9
iterm2 iterm2 3.0.10
iterm2 iterm2 3.0.11
iterm2 iterm2 3.0.12
iterm2 iterm2 3.0.13
iterm2 iterm2 3.0.14
iterm2 iterm2 3.0.15
iterm2 iterm2 3.0.20160531
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20151111:*:*:*:*:*:*:*",
              "matchCriteriaId": "D541D5B3-E66F-4C35-877C-8B171B6BF256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20151229:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1F6681-3CD0-42BD-92C6-81D76BFC1275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160102:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDEC933C-D7D1-4D18-9611-8A07071BD2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160113:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C28CA6-C843-408F-8524-098B26981AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160206:*:*:*:*:*:*:*",
              "matchCriteriaId": "90CC7A9C-2BF8-44B7-A8AE-E2C0D452C474",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160313:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A4F0136-FB99-4951-B246-498A7501134E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160422:*:*:*:*:*:*:*",
              "matchCriteriaId": "6798E204-DF84-4911-82CE-A87CA7A6D62E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160426:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9179C2-0AB5-4E26-9D4A-98AA9C271A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160510:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A21448D-CF4A-4EC9-B154-5E05EC49A88A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160523:*:*:*:*:*:*:*",
              "matchCriteriaId": "967F6537-D0FA-4AFB-BE1A-CFDD95755C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77FE4017-BEC1-417B-AFEA-79CB2629A090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.0:preview:*:*:*:*:*:*",
              "matchCriteriaId": "E10C2E76-3DDB-4B33-BE36-4DC537439A07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.1:preview:*:*:*:*:*:*",
              "matchCriteriaId": "850DCE9E-5A29-4878-8820-E97F54E434EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5533F002-4138-4C1F-A2BE-2AB87A825278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A81082-568B-4700-985B-49443277655A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B51E61-58AC-4A18-B34A-82FC6BAF5D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB81CA9-3B12-4446-9CE2-0E8E72F816EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A50C85F-782E-43E1-A12C-F9B491086792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E64E03B-3752-4D80-9DAE-227222EE53C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A7A7F88-B785-4D00-A6C1-ED974CA14127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "14898C43-C43F-4704-943E-998E699392AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7966560-0C38-4154-AF67-DFAD114886FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "805896B0-57C0-4102-87D9-9746D48C623D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B233D0E-3FBB-4859-905F-62FBD2A3B936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "205A29E1-6E96-4BCF-B9E9-8FFD1B8AFE50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C28CBC-8D90-4C84-B461-876256A123D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "614CA11F-13FF-47DE-B0DE-480C252A9498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.20160531:*:*:*:*:*:*:*",
              "matchCriteriaId": "5894EE5A-FB88-4C81-B34D-751FF0B42B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D292B9F-F988-498C-9D89-B3493C95E41F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "80258385-2E5C-4D0E-9BAD-F2BE332D7782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "02DEB069-F8F0-4A2E-9B22-2E9551CD5F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "F3B134C1-6C41-45F7-B9A5-1D2D9926B3AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A37BE0F6-328F-48CF-85ED-540AB8ED186A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "19251F95-8539-44B1-B510-B805A746AE09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "5B662018-34F8-42D7-8033-CB1E33880F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "109E96A3-1C7D-4CBB-8B12-E83608228F14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "6CD1F432-90F0-47E3-83EE-D14793BD143D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "D9663ACF-1DF0-4CF4-AF30-FE5DDEE37C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "E3A17E01-FE71-4ACB-A927-6F6B7AD0F078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "EA28FE8A-1EE8-46F4-A83C-50D3A4AB744D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware."
    },
    {
      "lang": "es",
      "value": "Las versiones 3.x de iTerm anteriores a 3.1.1 permiten que atacantes remotos descubran contrase\u00f1as mediante la lectura de consultas DNS. Se a\u00f1adi\u00f3 una nueva funci\u00f3n (por defecto) en la versi\u00f3n 3.0.0 (y versiones 2.9.x no lanzadas como la 2.9.20150717) que result\u00f3 en una potencial divulgaci\u00f3n de informaci\u00f3n. Para intentar ver si el texto bajo el cursor (o el texto seleccionado) es una URL, el texto tendr\u00eda que ser enviado como consulta DNS sin codificar. Esto podr\u00eda provocar que las contrase\u00f1as y otro tipo de informaci\u00f3n sensible sean enviadas en texto claro sin que el usuario sea consciente de ello."
    }
  ],
  "id": "CVE-2015-9231",
  "lastModified": "2024-11-21T02:40:06.487",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-09-20T20:29:00.183",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://news.ycombinator.com/item?id=15286956"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://news.ycombinator.com/item?id=15286956"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}