A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2022/12/msg00040.html | Mailing List Third Party Advisory |
https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00040.html | Mailing List Third Party Advisory |
https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00040.html - Mailing List, Third Party Advisory | |
References | () https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56 - Exploit, Third Party Advisory |
Information
Published : 2022-12-20 19:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4515
Mitre link : CVE-2022-4515
CVE.ORG link : CVE-2022-4515
JSON object : View
Products Affected
exuberant_ctags_project
- exuberant_ctags
debian
- debian_linux
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-noinfo