Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-3753

Опубликовано: 17 июл. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code.

РелизСтатусПримечание
ros-esm/xenial

released

1.12.17+9
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/bionic

released

1.14.13+5
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
ros-esm/focal/noetic

released

1.17.4+2
upstream

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

EPSS

Процентиль: 5%
0.0002
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
7 месяцев назад

A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code.

CVSS3: 7.8
debian
7 месяцев назад

A code execution vulnerability has been identified in the Robot Operat ...

CVSS3: 7.8
github
7 месяцев назад

A code execution vulnerability has been identified in the Robot Operating System (ROS) 'rosbag' tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() function to process unsanitized, user-supplied input in the 'rosbag filter' command. This flaw enables attackers to craft and execute arbitrary Python code.

EPSS

Процентиль: 5%
0.0002
Низкий

7.8 High

CVSS3