Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1244

Опубликовано: 12 фев. 2025
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

Отчет

To exploit this flaw, an attacker needs to trick a user into visiting a specially crafted website, an HTTP URL with a redirect or in general a custom man URI schemes. In order to exploit this vulnerability a user action is required, limiting the possibility of this issue to be exploited.

Меры по смягчению последствий

There is no an existing or known mitigation for this issue without disabling part of the Emacs core functionality. However, by avoiding opening or view untrusted files, websites, HTTP URLs or other URI resources with Emacs would reduce or prevent the risk of performing this attack successfully.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10emacsAffected
Red Hat Enterprise Linux 6emacsOut of support scope
Red Hat Enterprise Linux 7 Extended Lifecycle SupportemacsFixedRHSA-2025:213003.03.2025
Red Hat Enterprise Linux 8emacsFixedRHSA-2025:191727.02.2025
Red Hat Enterprise Linux 8emacsFixedRHSA-2025:191727.02.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportemacsFixedRHSA-2025:215703.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportemacsFixedRHSA-2025:196303.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceemacsFixedRHSA-2025:196303.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsemacsFixedRHSA-2025:196303.03.2025
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportemacsFixedRHSA-2025:196103.03.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2345150emacs: Shell Injection Vulnerability in GNU Emacs via Custom "man" URI Scheme

EPSS

Процентиль: 43%
0.00204
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
4 месяца назад

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

CVSS3: 8.8
nvd
4 месяца назад

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

CVSS3: 8.8
msrc
4 месяца назад

Описание отсутствует

CVSS3: 8.8
debian
4 месяца назад

A command injection flaw was found in the text editor Emacs. It could ...

suse-cvrf
4 месяца назад

Security update for emacs

EPSS

Процентиль: 43%
0.00204
Низкий

8.8 High

CVSS3