CVE-2012-5534 — Improper Input Validation in Weechat
Severity
7.5HIGHNVD
EPSS
2.0%
top 16.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 3
Latest updateMay 17
Description
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages3 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2012-5534: weechat - The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 al...↗2012
💬Community
3Bugzilla▶
CVE-2012-5534 weechat (scripts / plug-ins): Arbitrary code execution due to call of shell when executing command within hook_process [epel-6]↗2012-11-19
Bugzilla▶
CVE-2012-5534 weechat (scripts / plug-ins): Arbitrary code execution due to call of shell when executing command within hook_process [fedora-all]↗2012-11-19
Bugzilla▶
CVE-2012-5534 weechat (scripts / plug-ins): Arbitrary code execution due to call of shell when executing command within hook_process↗2012-11-19