![]() |
|
Message-ID: <0ad63b5d-3556-4077-868a-afa001c4e006@apache.org> Date: Tue, 1 Jul 2025 10:19:26 -0700 From: Michael Jumper <mjumper@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-35164: Apache Guacamole: Improper input validation of console codes Severity: moderate Base CVSS Score: 6.8 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) Affected versions: - Apache Guacamole 0.8.0 through 1.5.5 Description: The terminal emulator of Apache Guacamole 1.5.5 and older does not properly validate console codes received from servers via text-based protocols like SSH. If a malicious user has access to a text-based connection, a specially-crafted sequence of console codes could allow arbitrary code to be executed with the privileges of the running guacd process. Users are recommended to upgrade to version 1.6.0, which fixes this issue. Credit: We would like to thank Tizian Seehaus (Tibotix) for reporting this issue. References: https://guacamole.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-35164
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.