CVE-2022-48337
Severity
9.8CRITICAL
EPSS
0.4%
top 36.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 20
Latest updateSep 19
Description
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Patches
🔴Vulnerability Details
4📋Vendor Advisories
4Microsoft▶
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file because lib-src/etags.c uses the system C library function in its implementation ↗2023-02-14
Debian▶
CVE-2022-48337: emacs - GNU Emacs through 28.2 allows attackers to execute commands via shell metacharac...↗2022