8.6 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Radare2: command injection via pebble application files in radare2
A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing
References
Affected products
- <5.9.9
Package maintainers
-
@azahi Azat Bahawi <azat@bahawi.net>
-
@arkivm Vikram Narayanan <vikram186@gmail.com>
-
@7c6f434c Michael Raskin <7c6f434c@mail.ru>
-
@makefu Felix Richter <makefu@syntax-fehler.de>
-
@Mic92 Jörg Thalheim <joerg@thalheim.io>