Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1244

Опубликовано: 12 фев. 2025
Источник: redhat
CVSS3: 8.8

Описание

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

Отчет

To exploit this flaw, an attacker needs to trick a user into visiting a specially crafted website, an HTTP URL with a redirect or in general a custom man URI schemes. In order to exploit this vulnerability a user action is required, limiting the possibility of this issue to be exploited.

Меры по смягчению последствий

There is no an existing or known mitigation for this issue without disabling part of the Emacs core functionality. However, by avoiding opening or view untrusted files, websites, HTTP URLs or other URI resources with Emacs would reduce or prevent the risk of performing this attack successfully.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10emacsAffected
Red Hat Enterprise Linux 6emacsOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportemacsFixedRHSA-2025:213003.03.2025
Red Hat Enterprise Linux 8emacsFixedRHSA-2025:191727.02.2025
Red Hat Enterprise Linux 8emacsFixedRHSA-2025:191727.02.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportemacsFixedRHSA-2025:215703.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportemacsFixedRHSA-2025:196303.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceemacsFixedRHSA-2025:196303.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsemacsFixedRHSA-2025:196303.03.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportemacsFixedRHSA-2025:196103.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2345150emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
11 месяцев назад

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

CVSS3: 8.8
nvd
11 месяцев назад

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

CVSS3: 8.8
msrc
10 месяцев назад

Описание отсутствует

CVSS3: 8.8
debian
11 месяцев назад

A command injection flaw was found in the text editor Emacs. It could ...

suse-cvrf
10 месяцев назад

Security update for emacs

8.8 High

CVSS3