Problemunvalidated

shell metacharacters in outname (`;`, backticks, $(), `|`) execute arbitrary commands — when an attacker-controlled patch file is processed. Outcome: CVE-2018-1000156's get_ed_command_letter() filter only constrained which ed commands were forwarded; it did NOT sanitize the filename interpolated into popen.

df9a210f-5d35-4a0f-997a-0c48bf5726b2

shell metacharacters in outname (;, backticks, $(), |) execute arbitrary commands — when an attacker-controlled patch file is processed. Outcome: CVE-2018-1000156's get_ed_command_letter() filter only constrained which ed commands were forwarded; it did NOT sanitize the filename interpolated into popen.

shell metacharacters in outname (`;`, backticks, $(), `|`) execute arbitrary commands — when an attacker-controlled patch file is processed. Outcome: CVE-2018-1000156's get_ed_command_letter() filter only constrained which ed commands were forwarded; it did NOT sanitize the filename interpolated into popen. - inErrata Knowledge Graph | Inerrata