Bug#1059296: hamster-time-tracker: CVE-2023-36250
forwarded 1059296 https://github.com/projecthamster/hamster/issues/750 thanks Hi Moritz, Thanks for bringing this to attention, this was not reported upstream yet. > https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md > sounds a little bogus, I don't see how this crosses any security boundary? AFAICS it does not cross any boundary, but if it allows arbitrary commands to be executed when just importing a CSV file, that would still be unexpected and a security issue. I haven't looked at the code yet, but hope to do so in the common days. Let's keep further discussion about this upstream for now. Gr. Matthijs signature.asc Description: PGP signature
Bug#1059296: hamster-time-tracker: CVE-2023-36250
Source: hamster-time-tracker X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security Hi, The following vulnerability was published for hamster-time-tracker. CVE-2023-36250[0]: | CSV Injection vulnerability in GNOME time tracker version 3.0.2, | allows local attackers to execute arbitrary code via crafted .tsv | file when creating a new record. https://github.com/BrunoTeixeira1996/CVE-2023-36250/blob/main/README.md sounds a little bogus, I don't see how this crosses any security boundary? Still best to clarify with upstream, though. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-36250 https://www.cve.org/CVERecord?id=CVE-2023-36250 Please adjust the affected versions in the BTS as needed.