Vulnerabilities
Vulnerable Software
Iterm2:  >> Iterm2  >> 3.2.3  Security Vulnerabilities
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
CVSS Score
9.8
EPSS Score
0.003
Published
2023-10-23
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period.
CVSS Score
9.8
EPSS Score
0.003
Published
2023-10-23
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
CVSS Score
9.8
EPSS Score
0.002
Published
2023-10-22
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload.
CVSS Score
9.8
EPSS Score
0.002
Published
2023-10-22
iTerm2 before 3.4.18 mishandles a DECRQSS response.
CVSS Score
9.8
EPSS Score
0.011
Published
2022-11-23
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
CVSS Score
7.5
EPSS Score
0.005
Published
2019-11-17
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
CVSS Score
9.8
EPSS Score
0.012
Published
2019-10-09


Contact Us

Shodan ® - All rights reserved