# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).
References
Link | Resource |
---|---|
https://github.com/ohmyzsh/ohmyzsh/commit/72928432 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-11-30 02:15
Updated : 2021-12-01 00:05
NVD link : CVE-2021-3727
Mitre link : CVE-2021-3727
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
planetargon
- oh_my_zsh