tools/url_handler.pl in TIN 2.4.1 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a third party has reported that this is intentional behavior, because the documentation states "url_handler.pl was designed to work together with tin which only issues shell escaped absolute URLs.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://security-tracker.debian.org/tracker/CVE-2017-17520 |
|
History
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:51:32.021Z
Reserved: 2017-12-11T00:00:00.000Z
Link: CVE-2017-17520
Updated: 2024-08-05T20:51:32.021Z
Status : Deferred
Published: 2017-12-14T16:29:00.620
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-17520
No data.
OpenCVE Enrichment
No data.
Weaknesses