Arbitrary Code Injection Affecting gnachman/iterm2 package, versions [,3.3.6)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.92% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GNACHMANITERM2-2366250
  • published26 Jan 2022
  • disclosed9 Oct 2019
  • creditUnknown

Introduced: 9 Oct 2019

CVE-2019-9535  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade gnachman/iterm2 to version 3.3.6 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Injection. A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.

References

CVSS Base Scores

version 3.1