CVE-2012-2085

The exec_command function in common/helpers.py in Gajim before 0.15 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in an href attribute.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 69%
VendorProductVersion
gajimgajim
𝑥
≤ 0.14.4
gajimgajim
0.1
gajimgajim
0.10
gajimgajim
0.10.1
gajimgajim
0.11
gajimgajim
0.11.1
gajimgajim
0.11.2
gajimgajim
0.11.3
gajimgajim
0.11.4
gajimgajim
0.12
gajimgajim
0.12.1
gajimgajim
0.12.2
gajimgajim
0.12.3
gajimgajim
0.12.4
gajimgajim
0.12.5
gajimgajim
0.12.5:alpha1
gajimgajim
0.12.5:beta1
gajimgajim
0.13
gajimgajim
0.13.1
gajimgajim
0.13.2
gajimgajim
0.13.3
gajimgajim
0.13.4
gajimgajim
0.14
gajimgajim
0.14.1
gajimgajim
0.14.2
gajimgajim
0.14.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gajim
bullseye
1.3.1-1
fixed
bookworm
1.7.3-2
fixed
sid
1.9.5-1
fixed
trixie
1.9.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gajim
precise
Fixed 0.15-1
released
oneiric
Fixed 0.14.1-1ubuntu1.1
released
natty
Fixed 0.13.4-3ubuntu2.1
released
maverick
ignored
lucid
Fixed 0.13-0ubuntu2.1
released
hardy
ignored