Skip to content

TinyCheck was vulnerable to command injection due to insufficient checks of input parameters

Moderate
KLBot published GHSA-j2vj-mhr6-795m Jan 21, 2021

Package

No package listed

Affected versions

without commits 9fd360d and ea53de8

Patched versions

with commits 9fd360d and ea53de8

Description

Kaspersky has fixed the following security problem in the TinyCheck open source tool. The tool was vulnerable to command injection due to insufficient checks of input parameters in several places. For example, an attacker could inject malicious shell code in the Wi-Fi interfaces names to force the tool to execute malicious commands. Issue type: Arbitrary Code Execution.

List of affected products

TinyCheck without commits 9fd360d and ea53de8 from December 18th

Fixed versions

TinyCheck with commits 9fd360d and ea53de8 from December 18th
To update the tool to the latest commit/version, use the following commands: #cd /usr/share/tinycheck/ && bash update.sh.

Acknowledgements

We would like to thank the security researchers from Sayfer who discovered this issue and responsibly reported it.

Severity

Moderate

CVE ID

CVE-2020-36199

Weaknesses

No CWEs