CVE-2022-48337
CVSS V2 None
CVSS V3 None
Description
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
Overview
- CVE ID
- CVE-2022-48337
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-20T23:15:12
- Last Modified Date
- 2023-03-02T16:08:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:* | 1 | OR | 28.2 | |
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c | Patch |
https://www.debian.org/security/2023/dsa-5360 | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-48337 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48337 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 08:00:31 | Added to TrackCVE | |||
2023-04-17 08:00:34 | Weakness Enumeration | new |