CVE-2017-16667

backintime (aka Back in Time) before 1.1.24 did improper escaping/quoting of file paths used as arguments to the 'notify-send' command, leading to some parts of file paths being executed as shell commands within an os.system call in qt4/plugins/notifyplugin.py. This could allow an attacker to craft an unreadable file with a specific name to run arbitrary shell commands.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
VendorProductVersion
backintime_projectbackintime
𝑥
< 1.1.24
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
backintime
bullseye
1.2.1-3
fixed
stretch
no-dsa
jessie
no-dsa
wheezy
not-affected
bookworm
1.3.3-4
fixed
sid
1.5.2-1
fixed
trixie
1.5.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
backintime
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
not-affected
cosmic
not-affected
bionic
needed
artful
ignored
zesty
ignored
xenial
needed
trusty
dne