CVE-2022-45939
Severity
7.8HIGH
EPSS
0.0%
top 85.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28
Latest updateSep 19
Description
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5Microsoft▶
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file because lib-src/etags.c uses the system C library function in its implementation ↗2022-11-08
Debian▶
CVE-2022-45939: emacs - GNU Emacs through 28.2 allows attackers to execute commands via shell metacharac...↗2022