Vulnerabilites related to iTerm2 - iTerm2
Vulnerability from fkie_nvd
Published
2025-01-03 05:15
Modified
2025-06-20 18:10
Severity ?
Summary
iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53EB11E1-F547-407A-A808-8E9C3042A4E3",
              "versionEndExcluding": "3.5.11",
              "versionStartIncluding": "3.5.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation."
    },
    {
      "lang": "es",
      "value": "iTerm2 3.5.6 a 3.5.10 antes de 3.5.11 a veces permite a atacantes remotos obtener informaci\u00f3n confidencial de comandos de terminal mediante la lectura del archivo /tmp/framer.txt. Esto puede ocurrir en ciertas configuraciones de it2ssh y de integraci\u00f3n SSH, durante inicios de sesi\u00f3n remotos en hosts que tienen una instalaci\u00f3n de Python com\u00fan."
    }
  ],
  "id": "CVE-2025-22275",
  "lastModified": "2025-06-20T18:10:51.093",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.3,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.7,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-01-03T05:15:08.243",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/wikis/SSH-Integration-Information-Leak"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://news.ycombinator.com/item?id=42579472"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "cve@mitre.org",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-06-16 01:15
Modified
2025-06-18 16:40
Severity ?
Summary
In iTerm2 before 3.5.2, the "Terminal may report window title" setting is not honored, and thus remote code execution might occur but "is not trivially exploitable."
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E02516-12F6-4237-819A-08BD2E17DC23",
              "versionEndExcluding": "3.5.2",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In iTerm2 before 3.5.2, the \"Terminal may report window title\" setting is not honored, and thus remote code execution might occur but \"is not trivially exploitable.\""
    },
    {
      "lang": "es",
      "value": "En iTerm2 anterior a 3.5.2, la configuraci\u00f3n \"La terminal puede informar el t\u00edtulo de la ventana\" no se respeta y, por lo tanto, puede ocurrir la ejecuci\u00f3n remota de c\u00f3digo, pero \"no es trivialmente explotable\"."
    }
  ],
  "id": "CVE-2024-38395",
  "lastModified": "2025-06-18T16:40:48.790",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-06-16T01:15:48.537",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/f1e89f78dd72dcac3ba66d3d6f93db3f7f649219"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/tags/v3.5.2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2024/06/15/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/f1e89f78dd72dcac3ba66d3d6f93db3f7f649219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/tags/v3.5.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2024/06/15/1"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-22 04:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5A8378-60FE-4F69-A7AA-DEE9393C51C8",
              "versionEndExcluding": "3.4.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload."
    },
    {
      "lang": "es",
      "value": "iTerm2 anterior a 3.4.20 permite la ejecuci\u00f3n de c\u00f3digo (potencialmente remota) debido al mal manejo de ciertas secuencias de escape relacionadas con la carga."
    }
  ],
  "id": "CVE-2023-46301",
  "lastModified": "2024-11-21T08:28:15.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-22T04:15:09.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-116"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-06-16 21:15
Modified
2025-06-20 18:05
Severity ?
Summary
An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E02516-12F6-4237-819A-08BD2E17DC23",
              "versionEndExcluding": "3.5.2",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema en iTerm2 3.5.x anterior a 3.5.2. El uso sin filtrar de una secuencia de escape para informar el t\u00edtulo de una ventana, en combinaci\u00f3n con la funci\u00f3n de integraci\u00f3n tmux incorporada (habilitada de forma predeterminada), permite a un atacante inyectar c\u00f3digo arbitrario en la terminal, una vulnerabilidad diferente a CVE-2024-38395."
    }
  ],
  "id": "CVE-2024-38396",
  "lastModified": "2025-06-20T18:05:57.870",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-06-16T21:15:50.730",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/fc60236a914d63fb70a5c632e211203a4f1bd4dd"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/fc60236a914d63fb70a5c632e211203a4f1bd4dd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-17 18:15
Modified
2024-11-21 04:34
Summary
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CA7E37-00B5-4EDE-A96B-83A127175E0E",
              "versionEndIncluding": "3.3.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories."
    },
    {
      "lang": "es",
      "value": "iTerm2 versiones hasta 3.3.6, posee una documentaci\u00f3n potencialmente insuficiente sobre la presencia del historial de b\u00fasqueda en com.googlecode.iterm2.plist, lo que podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n confidencial, como es demostrado mediante la b\u00fasqueda de la cadena NoSyncSearchHistory en archivos .plist en repositorios de Git p\u00fablicos."
    }
  ],
  "id": "CVE-2019-19022",
  "lastModified": "2024-11-21T04:34:00.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-17T18:15:11.503",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-23 00:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
Impacted products
Vendor Product Version
iterm2 iterm2 *
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCBDFA5-07B5-4D12-95A7-EE26C15F0CCE",
              "versionEndIncluding": "3.4.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "37F1A1C2-AA8A-45A2-BCC7-36289E434567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "A632C6D5-2180-4B02-B8F1-EBE4442C1BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8A35ECC8-B179-449F-97D7-47017B89E269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E238E921-DEC6-470E-94C3-9ACFCAE47C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "13D2A7C5-650D-456D-97E0-79D146657A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "E67A594B-4ECA-4189-9C3A-08AF188F82DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "62D4145E-8CAA-439D-B917-BE332800EEC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "5622F6B3-ECFC-44D7-AD72-1EBE28E8889D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "E81D1628-8B0A-4DC8-B176-6A2827D91F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4F001-2578-46FE-996F-82DCB5DF3511",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line."
    },
    {
      "lang": "es",
      "value": "iTermSessionLauncher.m en iTerm2 anterior a 3.5.0beta12 no sanitiza las rutas en las URL de la p\u00e1gina de manual x. Pueden tener metacaracteres de shell para una l\u00ednea de comando /usr/bin/man."
    }
  ],
  "id": "CVE-2023-46321",
  "lastModified": "2024-11-21T08:28:17.990",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-23T00:15:08.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-117"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-23 00:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period.
Impacted products
Vendor Product Version
iterm2 iterm2 *
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0
iterm2 iterm2 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCBDFA5-07B5-4D12-95A7-EE26C15F0CCE",
              "versionEndIncluding": "3.4.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "37F1A1C2-AA8A-45A2-BCC7-36289E434567",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "A632C6D5-2180-4B02-B8F1-EBE4442C1BE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8A35ECC8-B179-449F-97D7-47017B89E269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E238E921-DEC6-470E-94C3-9ACFCAE47C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "13D2A7C5-650D-456D-97E0-79D146657A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "E67A594B-4ECA-4189-9C3A-08AF188F82DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "62D4145E-8CAA-439D-B917-BE332800EEC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "5622F6B3-ECFC-44D7-AD72-1EBE28E8889D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "E81D1628-8B0A-4DC8-B176-6A2827D91F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.5.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4F001-2578-46FE-996F-82DCB5DF3511",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname\u0027s initial character may be non-alphanumeric. The hostname\u0027s other characters may be outside the set of alphanumeric characters, dash, and period."
    },
    {
      "lang": "es",
      "value": "iTermSessionLauncher.m en iTerm2 anterior a 3.5.0beta12 no sanitiza los nombres de host ssh en las URL. El car\u00e1cter inicial del nombre de host puede no ser alfanum\u00e9rico. Los dem\u00e1s caracteres del nombre de host pueden estar fuera del conjunto de caracteres alfanum\u00e9ricos, guiones y puntos."
    }
  ],
  "id": "CVE-2023-46322",
  "lastModified": "2024-11-21T08:28:18.157",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-23T00:15:08.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-117"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-09-20 20:29
Modified
2025-04-20 01:37
Summary
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
References
cve@mitre.orghttps://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51Third Party Advisory
cve@mitre.orghttps://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/3688Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/5303Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/6050Exploit, Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/issues/6068Issue Tracking, Third Party Advisory
cve@mitre.orghttps://gitlab.com/gnachman/iterm2/wikis/dnslookupissueThird Party Advisory
cve@mitre.orghttps://news.ycombinator.com/item?id=15286956Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/3688Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/5303Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/6050Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/issues/6068Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/gnachman/iterm2/wikis/dnslookupissueThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://news.ycombinator.com/item?id=15286956Issue Tracking, Third Party Advisory
Impacted products
Vendor Product Version
iterm2 iterm2 2.9.20151111
iterm2 iterm2 2.9.20151229
iterm2 iterm2 2.9.20160102
iterm2 iterm2 2.9.20160113
iterm2 iterm2 2.9.20160206
iterm2 iterm2 2.9.20160313
iterm2 iterm2 2.9.20160422
iterm2 iterm2 2.9.20160426
iterm2 iterm2 2.9.20160510
iterm2 iterm2 2.9.20160523
iterm2 iterm2 3.0.0
iterm2 iterm2 3.0.0
iterm2 iterm2 3.0.1
iterm2 iterm2 3.0.2
iterm2 iterm2 3.0.3
iterm2 iterm2 3.0.4
iterm2 iterm2 3.0.5
iterm2 iterm2 3.0.6
iterm2 iterm2 3.0.7
iterm2 iterm2 3.0.8
iterm2 iterm2 3.0.9
iterm2 iterm2 3.0.10
iterm2 iterm2 3.0.11
iterm2 iterm2 3.0.12
iterm2 iterm2 3.0.13
iterm2 iterm2 3.0.14
iterm2 iterm2 3.0.15
iterm2 iterm2 3.0.20160531
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0
iterm2 iterm2 3.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20151111:*:*:*:*:*:*:*",
              "matchCriteriaId": "D541D5B3-E66F-4C35-877C-8B171B6BF256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20151229:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A1F6681-3CD0-42BD-92C6-81D76BFC1275",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160102:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDEC933C-D7D1-4D18-9611-8A07071BD2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160113:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C28CA6-C843-408F-8524-098B26981AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160206:*:*:*:*:*:*:*",
              "matchCriteriaId": "90CC7A9C-2BF8-44B7-A8AE-E2C0D452C474",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160313:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A4F0136-FB99-4951-B246-498A7501134E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160422:*:*:*:*:*:*:*",
              "matchCriteriaId": "6798E204-DF84-4911-82CE-A87CA7A6D62E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160426:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9179C2-0AB5-4E26-9D4A-98AA9C271A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160510:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A21448D-CF4A-4EC9-B154-5E05EC49A88A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:2.9.20160523:*:*:*:*:*:*:*",
              "matchCriteriaId": "967F6537-D0FA-4AFB-BE1A-CFDD95755C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77FE4017-BEC1-417B-AFEA-79CB2629A090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.0:preview:*:*:*:*:*:*",
              "matchCriteriaId": "E10C2E76-3DDB-4B33-BE36-4DC537439A07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.1:preview:*:*:*:*:*:*",
              "matchCriteriaId": "850DCE9E-5A29-4878-8820-E97F54E434EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5533F002-4138-4C1F-A2BE-2AB87A825278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "45A81082-568B-4700-985B-49443277655A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3B51E61-58AC-4A18-B34A-82FC6BAF5D12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB81CA9-3B12-4446-9CE2-0E8E72F816EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A50C85F-782E-43E1-A12C-F9B491086792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E64E03B-3752-4D80-9DAE-227222EE53C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A7A7F88-B785-4D00-A6C1-ED974CA14127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "14898C43-C43F-4704-943E-998E699392AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7966560-0C38-4154-AF67-DFAD114886FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "805896B0-57C0-4102-87D9-9746D48C623D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B233D0E-3FBB-4859-905F-62FBD2A3B936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "205A29E1-6E96-4BCF-B9E9-8FFD1B8AFE50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C28CBC-8D90-4C84-B461-876256A123D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "614CA11F-13FF-47DE-B0DE-480C252A9498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.0.20160531:*:*:*:*:*:*:*",
              "matchCriteriaId": "5894EE5A-FB88-4C81-B34D-751FF0B42B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D292B9F-F988-498C-9D89-B3493C95E41F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "80258385-2E5C-4D0E-9BAD-F2BE332D7782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "02DEB069-F8F0-4A2E-9B22-2E9551CD5F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "F3B134C1-6C41-45F7-B9A5-1D2D9926B3AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "A37BE0F6-328F-48CF-85ED-540AB8ED186A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "19251F95-8539-44B1-B510-B805A746AE09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "5B662018-34F8-42D7-8033-CB1E33880F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "109E96A3-1C7D-4CBB-8B12-E83608228F14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "6CD1F432-90F0-47E3-83EE-D14793BD143D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "D9663ACF-1DF0-4CF4-AF30-FE5DDEE37C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "E3A17E01-FE71-4ACB-A927-6F6B7AD0F078",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:3.1.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "EA28FE8A-1EE8-46F4-A83C-50D3A4AB744D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware."
    },
    {
      "lang": "es",
      "value": "Las versiones 3.x de iTerm anteriores a 3.1.1 permiten que atacantes remotos descubran contrase\u00f1as mediante la lectura de consultas DNS. Se a\u00f1adi\u00f3 una nueva funci\u00f3n (por defecto) en la versi\u00f3n 3.0.0 (y versiones 2.9.x no lanzadas como la 2.9.20150717) que result\u00f3 en una potencial divulgaci\u00f3n de informaci\u00f3n. Para intentar ver si el texto bajo el cursor (o el texto seleccionado) es una URL, el texto tendr\u00eda que ser enviado como consulta DNS sin codificar. Esto podr\u00eda provocar que las contrase\u00f1as y otro tipo de informaci\u00f3n sensible sean enviadas en texto claro sin que el usuario sea consciente de ello."
    }
  ],
  "id": "CVE-2015-9231",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-09-20T20:29:00.183",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://news.ycombinator.com/item?id=15286956"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://news.ycombinator.com/item?id=15286956"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-10-09 20:15
Modified
2024-11-21 04:51
Severity ?
Summary
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1132D3C-F86C-4FC1-ABF4-E1B43EB206F9",
              "versionEndIncluding": "3.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability exists in the way that iTerm2 integrates with tmux\u0027s control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim\u0027s computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad en la manera en que iTerm2 se integra con el modo de control de tmux, lo que puede permitir a un atacante ejecutar comandos arbitrarios al proporcionar una salida maliciosa al terminal. Esto afecta a versiones de iTerm2 hasta 3.3.5 incluy\u00e9ndola. Esta vulnerabilidad puede permitir a un atacante ejecutar comandos arbitrarios en la computadora de su v\u00edctima al proporcionar una salida maliciosa al terminal. Podr\u00eda ser explotada utilizando recursos de la l\u00ednea de comandos que imprimen contenido controlado por el atacante."
    }
  ],
  "id": "CVE-2019-9535",
  "lastModified": "2024-11-21T04:51:48.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-10-09T20:15:33.363",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
    },
    {
      "source": "cret@cert.org",
      "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://kb.cert.org/vuls/id/763073/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://kb.cert.org/vuls/id/763073/"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-349"
        }
      ],
      "source": "cret@cert.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-23 22:15
Modified
2025-04-25 19:15
Summary
iTerm2 before 3.4.18 mishandles a DECRQSS response.
References
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "392A1214-B460-4D3F-8882-0BF8D4660185",
              "versionEndExcluding": "3.4.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 before 3.4.18 mishandles a DECRQSS response."
    },
    {
      "lang": "es",
      "value": "iTerm2 en versiones anteriores a la 3.4.18 maneja mal una respuesta DECRQSS."
    }
  ],
  "id": "CVE-2022-45872",
  "lastModified": "2025-04-25T19:15:48.060",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-11-23T22:15:09.937",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://iterm2.com/downloads.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-22 04:15
Modified
2024-11-21 08:28
Severity ?
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
Impacted products
Vendor Product Version
iterm2 iterm2 *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5A8378-60FE-4F69-A7AA-DEE9393C51C8",
              "versionEndExcluding": "3.4.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration."
    },
    {
      "lang": "es",
      "value": "iTerm2 anterior a 3.4.20 permite la ejecuci\u00f3n de c\u00f3digo (potencialmente remota) debido al mal manejo de ciertas secuencias de escape relacionadas con la integraci\u00f3n de tmux."
    }
  ],
  "id": "CVE-2023-46300",
  "lastModified": "2024-11-21T08:28:15.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-22T04:15:09.740",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://iterm2.com/news.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-116"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-46321 (GCVE-0-2023-46321)
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-11 20:35
Severity ?
CWE
  • n/a
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:41.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "iterm2",
            "vendor": "iterm2",
            "versions": [
              {
                "lessThan": "3.5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46321",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-11T20:20:40.720607Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-117",
                "description": "CWE-117 Improper Output Neutralization for Logs",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T20:35:41.935Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T23:53:31.541867",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/commit/de3d351e1bd3bc1c1a4f85fe976c592e497dd071"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46321",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-11T20:35:41.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-19022 (GCVE-0-2019-19022)
Vulnerability from cvelistv5
Published
2019-11-17 10:59
Modified
2024-08-05 02:02
Severity ?
CWE
  • n/a
Summary
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T02:02:39.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-17T10:59:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-19022",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/8491",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/8491"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-19022",
    "datePublished": "2019-11-17T10:59:09",
    "dateReserved": "2019-11-17T00:00:00",
    "dateUpdated": "2024-08-05T02:02:39.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-46301 (GCVE-0-2023-46301)
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-12 17:48
Severity ?
CWE
  • n/a
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:40.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/news.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46301",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-12T17:48:41.039655Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:48:57.452Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T03:47:50.244689",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
        },
        {
          "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
        },
        {
          "url": "https://iterm2.com/news.html"
        },
        {
          "url": "https://github.com/gnachman/iTerm2/commit/85cbf5ebda472c9ec295887e99c2b6f1b5867f1b"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46301",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-12T17:48:57.452Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-45872 (GCVE-0-2022-45872)
Vulnerability from cvelistv5
Published
2022-11-23 00:00
Modified
2025-04-25 18:22
Severity ?
CWE
  • n/a
Summary
iTerm2 before 3.4.18 mishandles a DECRQSS response.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:24:03.207Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-45872",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-25T18:22:25.891979Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-25T18:22:30.427Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 before 3.4.18 mishandles a DECRQSS response."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-23T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-45872",
    "datePublished": "2022-11-23T00:00:00.000Z",
    "dateReserved": "2022-11-23T00:00:00.000Z",
    "dateUpdated": "2025-04-25T18:22:30.427Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-9231 (GCVE-0-2015-9231)
Vulnerability from cvelistv5
Published
2017-09-20 20:00
Modified
2024-09-16 17:23
Severity ?
CWE
  • n/a
Summary
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:43:41.676Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://news.ycombinator.com/item?id=15286956"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-20T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://news.ycombinator.com/item?id=15286956"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-9231",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/6050",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/6050"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/5303",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/5303"
            },
            {
              "name": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51",
              "refsource": "MISC",
              "url": "https://github.com/gnachman/iTerm2/commit/33ccaf61e34ef32ffc9d6b2be5dd218f6bb55f51"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/wikis/dnslookupissue"
            },
            {
              "name": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522",
              "refsource": "MISC",
              "url": "https://github.com/gnachman/iTerm2/commit/e4eb1063529deb575b75b396138d41554428d522"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/6068",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/6068"
            },
            {
              "name": "https://gitlab.com/gnachman/iterm2/issues/3688",
              "refsource": "MISC",
              "url": "https://gitlab.com/gnachman/iterm2/issues/3688"
            },
            {
              "name": "https://news.ycombinator.com/item?id=15286956",
              "refsource": "MISC",
              "url": "https://news.ycombinator.com/item?id=15286956"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-9231",
    "datePublished": "2017-09-20T20:00:00Z",
    "dateReserved": "2017-09-20T00:00:00Z",
    "dateUpdated": "2024-09-16T17:23:28.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-38395 (GCVE-0-2024-38395)
Vulnerability from cvelistv5
Published
2024-06-16 00:00
Modified
2024-08-02 04:12
Severity ?
CWE
  • n/a
Summary
In iTerm2 before 3.5.2, the "Terminal may report window title" setting is not honored, and thus remote code execution might occur but "is not trivially exploitable."
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "iterm2",
            "vendor": "iterm2",
            "versions": [
              {
                "status": "affected",
                "version": "3.5.2"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-38395",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-18T14:15:43.067220Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-18T14:18:11.693Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:12:24.681Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/commit/f1e89f78dd72dcac3ba66d3d6f93db3f7f649219"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2024/06/15/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/tags/v3.5.2"
          },
          {
            "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In iTerm2 before 3.5.2, the \"Terminal may report window title\" setting is not honored, and thus remote code execution might occur but \"is not trivially exploitable.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-17T15:06:00.006301",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/commit/f1e89f78dd72dcac3ba66d3d6f93db3f7f649219"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2024/06/15/1"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/tags/v3.5.2"
        },
        {
          "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-38395",
    "datePublished": "2024-06-16T00:00:00",
    "dateReserved": "2024-06-16T00:00:00",
    "dateUpdated": "2024-08-02T04:12:24.681Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-9535 (GCVE-0-2019-9535)
Vulnerability from cvelistv5
Published
2019-10-09 19:15
Modified
2024-09-17 02:11
Severity ?
CWE
Summary
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
Impacted products
Vendor Product Version
iTerm2 iTerm2 Version: 3.3.5   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:54:44.484Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#763073",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "https://kb.cert.org/vuls/id/763073/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "iTerm2",
          "vendor": "iTerm2",
          "versions": [
            {
              "lessThanOrEqual": "3.3.5",
              "status": "affected",
              "version": "3.3.5",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Thanks to Stefan Gr\u00f6nke and Fabian Freyer of Radically Open Security for finding this vulnerability, the Mozilla Open Source Support (MOSS) project for supporting the audit, and George Nachman of iTerm2 for developing the fix, and all parties for coordinating this vulnerability."
        }
      ],
      "datePublic": "2019-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability exists in the way that iTerm2 integrates with tmux\u0027s control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim\u0027s computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-349",
              "description": "CWE-349",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-10-09T19:15:44",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "VU#763073",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "https://kb.cert.org/vuls/id/763073/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://groups.google.com/forum/#%21topic/iterm2-discuss/57k_AuLdQa4"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution",
      "workarounds": [
        {
          "lang": "en",
          "value": "Update iTerm2 to version 3.3.6, which includes mitigations against exploitation of this vulnerability."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.8"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "DATE_PUBLIC": "2019-10-09T04:00:00.000Z",
          "ID": "CVE-2019-9535",
          "STATE": "PUBLIC",
          "TITLE": "iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "iTerm2",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "3.3.5",
                            "version_value": "3.3.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "iTerm2"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Thanks to Stefan Gr\u00f6nke and Fabian Freyer of Radically Open Security for finding this vulnerability, the Mozilla Open Source Support (MOSS) project for supporting the audit, and George Nachman of iTerm2 for developing the fix, and all parties for coordinating this vulnerability."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability exists in the way that iTerm2 integrates with tmux\u0027s control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim\u0027s computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.8"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-349"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#763073",
              "refsource": "CERT-VN",
              "url": "https://kb.cert.org/vuls/id/763073/"
            },
            {
              "name": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/",
              "refsource": "MISC",
              "url": "https://blog.mozilla.org/security/2019/10/09/iterm2-critical-issue-moss-audit/"
            },
            {
              "name": "https://groups.google.com/forum/#!topic/iterm2-discuss/57k_AuLdQa4",
              "refsource": "CONFIRM",
              "url": "https://groups.google.com/forum/#!topic/iterm2-discuss/57k_AuLdQa4"
            }
          ]
        },
        "source": {
          "discovery": "UNKNOWN"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Update iTerm2 to version 3.3.6, which includes mitigations against exploitation of this vulnerability."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2019-9535",
    "datePublished": "2019-10-09T19:15:44.101481Z",
    "dateReserved": "2019-03-01T00:00:00",
    "dateUpdated": "2024-09-17T02:11:00.076Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-46322 (GCVE-0-2023-46322)
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-11 20:28
Severity ?
CWE
  • n/a
Summary
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:41.273Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "iterm2",
            "vendor": "iterm2",
            "versions": [
              {
                "lessThan": "3.5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46322",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-11T20:14:29.861746Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-117",
                "description": "CWE-117 Improper Output Neutralization for Logs",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T20:28:05.384Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname\u0027s initial character may be non-alphanumeric. The hostname\u0027s other characters may be outside the set of alphanumeric characters, dash, and period."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T23:53:11.890070",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/commit/ef7bb84520013b2524df9787d4aa9f2c96746c01"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46322",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-11T20:28:05.384Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-22275 (GCVE-0-2025-22275)
Vulnerability from cvelistv5
Published
2025-01-03 00:00
Modified
2025-01-03 14:58
Severity ?
CWE
  • CWE-532 - Insertion of Sensitive Information into Log File
Summary
iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation.
Impacted products
Vendor Product Version
iTerm2 iTerm2 Version: 3.5.6   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-22275",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-03T14:58:43.443113Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-03T14:58:54.733Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "iTerm2",
          "vendor": "iTerm2",
          "versions": [
            {
              "lessThan": "3.5.11",
              "status": "affected",
              "version": "3.5.6",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:iterm2:iterm2:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "3.5.11",
                  "versionStartIncluding": "3.5.6",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "CWE-532 Insertion of Sensitive Information into Log File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-03T06:23:55.308681Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog"
        },
        {
          "url": "https://news.ycombinator.com/item?id=42579472"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/wikis/SSH-Integration-Information-Leak"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-22275",
    "datePublished": "2025-01-03T00:00:00",
    "dateReserved": "2025-01-03T00:00:00",
    "dateUpdated": "2025-01-03T14:58:54.733Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-38396 (GCVE-0-2024-38396)
Vulnerability from cvelistv5
Published
2024-06-16 00:00
Modified
2024-08-02 04:12
Severity ?
CWE
  • n/a
Summary
An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:gnachman:iterm2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "iterm2",
            "vendor": "gnachman",
            "versions": [
              {
                "lessThan": "3.5.2",
                "status": "affected",
                "version": "3.5.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-38396",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-17T13:41:44.316151Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-17T13:41:48.527Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:12:24.434Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/downloads.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://gitlab.com/gnachman/iterm2/-/commit/fc60236a914d63fb70a5c632e211203a4f1bd4dd"
          },
          {
            "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-17T15:06:01.698288",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://iterm2.com/downloads.html"
        },
        {
          "url": "https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html"
        },
        {
          "url": "https://gitlab.com/gnachman/iterm2/-/commit/fc60236a914d63fb70a5c632e211203a4f1bd4dd"
        },
        {
          "name": "[oss-security] 20240617 Re: iTerm2 3.5.x title reporting bug",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2024/06/17/1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2024-38396",
    "datePublished": "2024-06-16T00:00:00",
    "dateReserved": "2024-06-16T00:00:00",
    "dateUpdated": "2024-08-02T04:12:24.434Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-46300 (GCVE-0-2023-46300)
Vulnerability from cvelistv5
Published
2023-10-22 00:00
Modified
2024-09-12 17:49
Severity ?
CWE
  • n/a
Summary
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T20:45:40.846Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://iterm2.com/news.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-46300",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-12T17:49:29.200906Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:49:38.677Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-22T03:48:15.545771",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/gnachman/iTerm2/commit/ae8192522661c34d1cbe57f6f9ef2ff0a337c2a5"
        },
        {
          "url": "https://github.com/gnachman/iTerm2/commit/b2268b03b5f3d4cd8ca275eaef5d16d0fac20009"
        },
        {
          "url": "https://blog.solidsnail.com/posts/2023-08-28-iterm2-rce"
        },
        {
          "url": "https://iterm2.com/news.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-46300",
    "datePublished": "2023-10-22T00:00:00",
    "dateReserved": "2023-10-22T00:00:00",
    "dateUpdated": "2024-09-12T17:49:38.677Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}