The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
13 Feb 2023, 00:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))". |
02 Feb 2023, 20:18
Type | Values Removed | Values Added |
---|---|---|
Summary | It was found that the wordexp() function would perform command substitution even when the WRDE_NOCMD flag was specified. An attacker able to provide specially crafted input to an application using the wordexp() function, and not sanitizing the input correctly, could potentially use this flaw to execute arbitrary commands with the credentials of the user running that application. | |
References |
|
|
Information
Published : 2014-11-24 15:59
Updated : 2023-12-10 11:31
NVD link : CVE-2014-7817
Mitre link : CVE-2014-7817
CVE.ORG link : CVE-2014-7817
JSON object : View
Products Affected
opensuse
- opensuse
canonical
- ubuntu_linux
debian
- debian_linux
gnu
- glibc
CWE
CWE-20
Improper Input Validation