org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
References
Configurations
History
26 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2023/10/msg00019.html - | |
References | () https://lists.debian.org/debian-lts-announce/2023/05/msg00008.html - | |
References | () https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=a8006ea580ed74f27f974d60b598143b04ad1741 - Mailing List, Patch | |
References | () https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=8f8ec2ccf3f5ef8f38d68ec84a7e4739c45db485 - Mailing List, Patch |
07 Nov 2023, 04:10
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
12 Oct 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 May 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-03-19 03:15
Updated : 2025-02-26 21:15
NVD link : CVE-2023-28617
Mitre link : CVE-2023-28617
JSON object : View
Products Affected
gnu
- org_mode
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')