Vulnerability Details : CVE-2014-2095
Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0, when a Fedora package such as 0.8.2-1 is not used, allows local users to gain privileges via a Trojan horse bin/catfish.pyc under the current working directory.
Exploit prediction scoring system (EPSS) score for CVE-2014-2095
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-2095
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2014-2095
-
https://bugzilla.redhat.com/show_bug.cgi?id=1069396
1069396 – (CVE-2014-2093, CVE-2014-2094, CVE-2014-2095, CVE-2014-2096) CVE-2014-2093 CVE-2014-2096 catfish: insecure loading of python script
-
http://openwall.com/lists/oss-security/2014/02/25/2
oss-security - Re: CVE request for catfish program
-
http://openwall.com/lists/oss-security/2014/02/25/4
oss-security - Re: CVE request for catfish program
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739958
#739958 - catfish: insecure when cwd is world-writable (CVE-2014-2093 CVE-2014-2094 CVE-2014-2095 CVE-2014-2096) - Debian Bug report logs
Products affected by CVE-2014-2095
- cpe:2.3:a:catfish_project:catfish:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:catfish_project:catfish:0.6.3:*:*:*:*:*:*:*