A command injection vulnerability in 'Back in Time' may allow for the execution of arbitrary shell commands.
Package | app-backup/backintime on all architectures |
---|---|
Affected versions | < 1.1.24 |
Unaffected versions | >= 1.1.24 |
A simple backup tool for Linux, inspired by “flyback project”.
‘Back in Time’ did improper escaping/quoting of file paths used as arguments to the ‘notify-send’ command leading to some parts of file paths being executed as shell commands within an os.system call.
A context-dependent attacker could execute arbitrary shell commands via a specially crafted file.
There is no known workaround at this time.
All ‘Back In Time’ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-backup/backintime-1.1.24"
Release date
January 07, 2018
Latest revision
January 07, 2018: 1
Severity
normal
Exploitable
local, remote
Bugzilla entries