CVE Vulnerabilities

CVE-2017-17524

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Dec 14, 2017 | Modified: Dec 28, 2017
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

library/www_browser.pl in SWI-Prolog 7.2.3 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Swi-prolog Swi-prolog 7.2.3 (including) 7.2.3 (including)
Swi-prolog Ubuntu artful *
Swi-prolog Ubuntu bionic *
Swi-prolog Ubuntu cosmic *
Swi-prolog Ubuntu devel *
Swi-prolog Ubuntu disco *
Swi-prolog Ubuntu eoan *
Swi-prolog Ubuntu esm-apps/bionic *
Swi-prolog Ubuntu esm-apps/focal *
Swi-prolog Ubuntu esm-apps/jammy *
Swi-prolog Ubuntu esm-apps/noble *
Swi-prolog Ubuntu esm-apps/xenial *
Swi-prolog Ubuntu focal *
Swi-prolog Ubuntu groovy *
Swi-prolog Ubuntu hirsute *
Swi-prolog Ubuntu impish *
Swi-prolog Ubuntu jammy *
Swi-prolog Ubuntu kinetic *
Swi-prolog Ubuntu lunar *
Swi-prolog Ubuntu mantic *
Swi-prolog Ubuntu noble *
Swi-prolog Ubuntu oracular *
Swi-prolog Ubuntu trusty *
Swi-prolog Ubuntu upstream *
Swi-prolog Ubuntu xenial *
Swi-prolog Ubuntu zesty *

Potential Mitigations

References