CVE-2024-32487Static Code Injection in Less

Severity
8.6HIGHNVD
EPSS
0.3%
top 44.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 13
Latest updateApr 29

Description

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:HExploitability: 1.8 | Impact: 6.0

Affected Packages9 packages

debiandebian/less< less 590-2.1~deb12u2 (bookworm)
Debiangnu/less< 551-2+deb11u2+3

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-f53j-pgm5-c4r3: less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename2024-04-13
OSV
CVE-2024-32487: less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename2024-04-13

📋Vendor Advisories

4
Ubuntu
less vulnerability2024-04-29
Red Hat
less: OS command injection2024-04-13
Microsoft
less through 653 allows OS command execution via a newline character in the name of a file because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled fil2024-04-09
Debian
CVE-2024-32487: less - less through 653 allows OS command execution via a newline character in the name...2024