Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-48339

Опубликовано: 20 фев. 2023
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
emacsfixed1:28.2+1-11package

Примечания

  • Fixed by: https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=1b4dc4691c1f87fc970fbe568b43869a15ad0d4c

  • https://debbugs.gnu.org/cgi/bugreport.cgi?bug=60295

EPSS

Процентиль: 26%
0.00085
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVSS3: 7.8
redhat
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVSS3: 7.8
nvd
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 9.8
github
больше 2 лет назад

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

EPSS

Процентиль: 26%
0.00085
Низкий