Description
The (1) stopserver.sh and (2) startserver.sh scripts in Adobe Version Cue on Mac OS X uses the current working directory to find and execute the productname.sh script, which allows local users to execute arbitrary code by copying and calling the scripts from a user-controlled directory.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Jonathan Bringhurst · textlocalosx
https://www.exploit-db.com/exploits/680
References (10)
Core 10
Core References
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/13399
Various Sources x_refsource_confirm
http://www.adobe.com/support/techdocs/331621.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/12297
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2004-12/0040.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1012446
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11833
Exploit x_refsource_misc
http://www.securiteam.com/exploits/5EP0D20FQC.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/12298
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111627622403544&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/18445
Scores
EPSS
0.0076
EPSS Percentile
73.4%
Details
Status
published
Products (2)
adobe/version_cue
gold
apple/mac_os_x
10.3.6
Published
May 17, 2005
Tracked Since
Feb 18, 2026