### [CVE-2021-23556](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23556) ![](https://img.shields.io/static/v1?label=Product&message=guake&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Exposed%20Dangerous%20Method%20or%20Function&color=brightgreen) ### Description The package guake before 3.8.5 are vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands. ### POC #### Reference - https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334 #### Github No PoCs found on GitHub currently.