CVE-2017-14500 log

Source
Severity High
Remote Yes
Type Arbitrary command execution
Description
Improper Neutralization of Special Elements used in an OS Command in the podcast playback function of Podbeuter in Newsbeuter 0.3 through 2.9 allows remote attackers to perform user-assisted shell command execution by crafting an RSS item with a media enclosure (i.e., a podcast file) that includes shell metacharacters in its filename, related to pb_controller.cpp and queueloader.cpp. When the user plays the file in Podbeuter, the shell code will be executed.
Group Package Affected Fixed Severity Status Ticket
AVG-401 newsbeuter 2.9-7 2.9-8 High Fixed
Date Advisory Group Package Severity Type
16 Sep 2017 ASA-201709-11 AVG-401 newsbeuter High arbitrary command execution
References
https://github.com/akrennmair/newsbeuter/issues/598
https://github.com/akrennmair/newsbeuter/commit/c8fea2f60c18ed30bdd1bb6f798e994e51a58260
https://github.com/akrennmair/newsbeuter/commit/26f5a4350f3ab5507bb8727051c87bb04660f333