Affected configuration(s):
cpe:/a:catfish_project:catfish:0.6.0
cpe:/a:catfish_project:catfish:0.6.1
cpe:/a:catfish_project:catfish:0.6.2
cpe:/a:catfish_project:catfish:0.6.3
cpe:/a:catfish_project:catfish:0.6.4
cpe:/a:catfish_project:catfish:0.8.0
cpe:/a:catfish_project:catfish:0.8.1
cpe:/a:catfish_project:catfish:0.8.2
cpe:/a:catfish_project:catfish:1.0.0
Date published: 2014-02-26T09:55:08.600-05:00
Date last modified: 2014-03-11T12:57:14.160-04:00
CVSS Score: 4.6
Principal attack vector: LOCAL
Complexity: LOW
Reference URL: http://openwall.com/lists/oss-security/2014/02/25/2
Summary: Untrusted search path vulnerability in Catfish 0.6.0 through 1.0.0 allows local users to gain privileges via a Trojan horse bin/catfish.py under the current working directory.