Back In Time: Command injection A command injection vulnerability in 'Back in Time' may allow for the execution of arbitrary shell commands. backintime 2018-01-07 2018-01-07 636974 local, remote 1.1.24 1.1.24

A simple backup tool for Linux, inspired by “flyback project”.

‘Back in Time’ did improper escaping/quoting of file paths used as arguments to the ‘notify-send’ command leading to some parts of file paths being executed as shell commands within an os.system call.

A context-dependent attacker could execute arbitrary shell commands via a specially crafted file.

There is no known workaround at this time.

All ‘Back In Time’ users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=app-backup/backintime-1.1.24"
CVE-2017-16667 jmbailey jmbailey