sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.
No PoCs from references.
- https://github.com/cloudpassage-community/vulnerable_image_check
- https://github.com/cloudpassage/vulnerable_image_check