Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-32487

Опубликовано: 13 апр. 2024
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.

An OS command injection flaw was found in Less. Since quoting is mishandled in filename.c, opening files with attacker-controlled file names can lead to OS command execution. Exploitation requires the LESSOPEN environment variable, which is set by default in many common cases.

Отчет

The described vulnerability in less poses an Important security risk due to its potential for arbitrary OS command execution. Exploitation of this vulnerability allows an attacker to inject malicious commands through specially crafted filenames containing newline characters. This could lead to unauthorized access, data exfiltration, or even full system compromise, depending on the privileges of the user executing the less command. Furthermore, the mishandling of the LESSOPEN environment variable exacerbates the issue, as it can be set by default in many installations, providing an additional vector for exploitation.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10lessNot affected
Red Hat Enterprise Linux 6lessOut of support scope
Red Hat Enterprise Linux 7lessFixedRHSA-2024:366906.06.2024
Red Hat Enterprise Linux 8lessFixedRHSA-2024:425602.07.2024
Red Hat Enterprise Linux 8.2 Advanced Update SupportlessFixedRHSA-2024:436608.07.2024
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportlessFixedRHSA-2024:441609.07.2024
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicelessFixedRHSA-2024:441609.07.2024
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionslessFixedRHSA-2024:441609.07.2024
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportlessFixedRHSA-2024:441809.07.2024
Red Hat Enterprise Linux 8.6 Telecommunications Update ServicelessFixedRHSA-2024:441809.07.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-78

EPSS

Процентиль: 37%
0.00151
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 1 года назад

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.

CVSS3: 8.6
nvd
около 1 года назад

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.

CVSS3: 8.6
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.6
debian
около 1 года назад

less through 653 allows OS command execution via a newline character i ...

suse-cvrf
около 1 года назад

Security update for less

EPSS

Процентиль: 37%
0.00151
Низкий

8.6 High

CVSS3