Learn about CVE-2020-15167, a vulnerability in Miller that allows attackers to execute arbitrary code via a malicious configuration file. Find out the impact, affected systems, and mitigation steps.
In Miller (command line utility) using the configuration file support introduced in version 5.9.0, an attacker can run arbitrary code by placing a malicious
.mlrrc
file in the working directory. A fix is available in Miller 5.9.1.
Understanding CVE-2020-15167
This CVE involves arbitrary code execution in Miller due to a vulnerability in the configuration file support.
What is CVE-2020-15167?
CVE-2020-15167 is a security vulnerability in Miller that allows an attacker to execute arbitrary code by manipulating the
.mlrrc
configuration file.
The Impact of CVE-2020-15167
The impact of this vulnerability is rated as HIGH with a CVSS base score of 8.2. It can lead to confidentiality, integrity, and availability compromises.
Technical Details of CVE-2020-15167
This section provides more technical insights into the CVE.
Vulnerability Description
The vulnerability in Miller allows attackers to execute arbitrary code by exploiting the configuration file support in version 5.9.0.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by placing a malicious
.mlrrc
file in the working directory of the Miller utility.
Mitigation and Prevention
Protecting systems from CVE-2020-15167 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates