Описание
Ghidra/RuntimeScripts/Linux/support/launch.sh in NSA Ghidra through 10.2.2 passes user-provided input into eval, leading to command injection when calling analyzeHeadless with untrusted input.
Ссылки
- ExploitIssue TrackingThird Party Advisory
- PatchThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 10.2.2 (включая)
cpe:2.3:a:nsa:ghidra:*:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.04124
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-77
CWE-77
Связанные уязвимости
CVSS3: 9.8
debian
около 3 лет назад
Ghidra/RuntimeScripts/Linux/support/launch.sh in NSA Ghidra through 10 ...
CVSS3: 9.8
github
около 3 лет назад
Ghidra/RuntimeScripts/Linux/support/launch.sh in NSA Ghidra through 10.2.2 passes user-provided input into eval, leading to command injection when calling analyzeHeadless with untrusted input.
EPSS
Процентиль: 88%
0.04124
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-77
CWE-77