Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.
https://www.debian.org/security/2019/dsa-4371
https://usn.ubuntu.com/3863-2/
https://usn.ubuntu.com/3863-1/
https://security.netapp.com/advisory/ntap-20190125-0002/
http://www.securityfocus.com/bid/106690
https://lists.debian.org/debian-lts-announce/2019/01/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/01/msg00013.html
https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
Source: Mitre, NVD
Published: 2019-01-28
Updated: 2024-11-21
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 8.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.10065