Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-42694

Опубликовано: 01 нояб. 2021
Источник: redhat
CVSS3: 8.3

Описание

An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard (all versions). Unless mitigated, an adversary could produce source code identifiers using homoglyph characters that render visually identical to but are distinct from a target identifier. In this way, an adversary could inject adversarial identifier definitions in upstream software that are not detected by human reviewers and are invoked deceptively in downstream software. The Unicode Consortium has documented this class of security vulnerability in its document, Unicode Technical Report #36, Unicode Security Considerations. The Unicode Consortium also provides guidance on mitigations for this class of issues in Unicode Technical Standard #39, Unicode Security Mechanisms.

A flaw was found in the way Unicode standards are implemented in the context of development environments, which have specialized requirements for rendering text. Homoglyphs are different Unicode characters that, to the naked eye, look the same. An attacker could use homoglyphs to deceive a human reviewer by creating a malicious patch containing functions that look similar to standard library functions, such as print, but replace one character with a homoglyph. This function can then be defined in an upstream dependency to launch source code-related attacks.

Отчет

The vulnerability is classified as moderate severity because it relies on social engineering and visual deception rather than exploiting a technical flaw in the software itself. While homoglyph-based attacks can deceive human reviewers, the impact is limited to cases where the code is not adequately reviewed or where automated tools fail to detect suspicious Unicode characters. Unlike higher-severity vulnerabilities, which may allow direct exploitation of system resources or escalation of privileges, this issue primarily targets code readability and review processes. Additionally, it is important to note that this vulnerability does not affect Red Hat products, as it arises from the broader issue of Unicode handling in development environments rather than a flaw in Red Hat's implementations.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7gccNot affected
Red Hat Enterprise Linux 8gccNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-838
https://bugzilla.redhat.com/show_bug.cgi?id=2015365environment: Homoglyph characters can lead to trojan source attack

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
nvd
больше 4 лет назад

An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. NOTE: the Unicode Consortium offers the following alternative approach to presenting this concern. An issue is noted in the nature of international text that can affect applications that implement support for The Unicode Standard (all versions). Unless mitigated, an adversary could produce source code identifiers using homoglyph characters that render visually identical to but are distinct from a target identifier. In this way, an adversary could inject adversarial identifier definitions in upstream software that are not detected by human reviewers and are invoked dec

CVSS3: 8.3
github
больше 3 лет назад

An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software.

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость функционала определения символа в реализации стандарта Unicode, связанная с ошибками при генерации кода с использованием гомоглифов, позволяющая нарушителю выполнить произвольный код

8.3 High

CVSS3