The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is "it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not."
References
Link | Resource |
---|---|
https://github.com/tradr-project/tf_remapper_cpp/issues/1 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
01 Aug 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-75 |
11 Apr 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Nov 2023, 03:56
Type | Values Removed | Values Added |
---|---|---|
Summary | The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is "it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not." |
Information
Published : 2023-01-04 19:15
Updated : 2024-08-03 15:15
NVD link : CVE-2022-48217
Mitre link : CVE-2022-48217
CVE.ORG link : CVE-2022-48217
JSON object : View
Products Affected
tradr-project
- tf_remapper
CWE
NVD-CWE-noinfo
CWE-75
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)