A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.
References
Link | Resource |
---|---|
https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00040.html | Mailing List Third Party Advisory |
Information
Published : 2022-12-20 11:15
Updated : 2023-01-03 09:22
NVD link : CVE-2022-4515
Mitre link : CVE-2022-4515
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
debian
- debian_linux
exuberant_ctags_project
- exuberant_ctags