Bug#1059296: hamster-time-tracker: CVE-2023-36250

2023-12-24 Thread Matthijs Kooijman
forwarded 1059296 https://github.com/projecthamster/hamster/issues/750
thanks

Hi Moritz,

Thanks for bringing this to attention, this was not reported upstream
yet.

> https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md
> sounds a little bogus, I don't see how this crosses any security boundary?

AFAICS it does not cross any boundary, but if it allows arbitrary
commands to be executed when just importing a CSV file, that would still
be unexpected and a security issue.

I haven't looked at the code yet, but hope to do so in the common days.
Let's keep further discussion about this upstream for now.

Gr.

Matthijs


signature.asc
Description: PGP signature


Bug#1059296: hamster-time-tracker: CVE-2023-36250

2023-12-22 Thread Moritz Mühlenhoff
Source: hamster-time-tracker
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for hamster-time-tracker.

CVE-2023-36250[0]:
| CSV Injection vulnerability in GNOME time tracker version 3.0.2,
| allows local attackers to execute arbitrary code via crafted .tsv
| file when creating a new record.

https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md
sounds a little bogus, I don't see how this crosses any security boundary?

Still best to clarify with upstream, though.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-36250
https://www.cve.org/CVERecord?id=CVE-2023-36250

Please adjust the affected versions in the BTS as needed.