cve/2018/CVE-2018-6353.md

19 lines
992 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-6353](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6353)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Python console in Electrum through 2.9.4 and 3.x through 3.0.5 supports arbitrary Python code without considering (1) social-engineering attacks in which a user pastes code that they do not understand and (2) code pasted by a physically proximate attacker at an unattended workstation, which makes it easier for attackers to steal Bitcoin via hook code that runs at a later time when the wallet password has been entered, a different vulnerability than CVE-2018-1000022.
### POC
#### Reference
- https://github.com/spesmilo/electrum/issues/3678
- https://github.com/spesmilo/electrum/pull/3700
#### Github
No PoCs found on GitHub currently.