iTerm2 3.5.6 through 3.5.10 before 3.5.11 sometimes allows remote attackers to obtain sensitive information from terminal commands by reading the /tmp/framer.txt file. This can occur for certain it2ssh and SSH Integration configurations, during remote logins to hosts that have a common Python installation.
References
| Link | Resource |
|---|---|
| https://gitlab.com/gnachman/iterm2/-/wikis/SSH-Integration-Information-Leak | Third Party Advisory |
| https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog | Release Notes |
| https://news.ycombinator.com/item?id=42579472 | Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-01-03 05:15
Updated : 2025-06-20 18:10
NVD link : CVE-2025-22275
Mitre link : CVE-2025-22275
CVE.ORG link : CVE-2025-22275
JSON object : View
Products Affected
iterm2
- iterm2
CWE
CWE-532
Insertion of Sensitive Information into Log File
