SB2023021401 - OS command injection in Ghidra



SB2023021401 - OS command injection in Ghidra

Published: February 14, 2023

Security Bulletin ID SB2023021401
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use of Potentially Dangerous Function (CVE-ID: CVE-2023-22671)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to Ghidra client application on Linux and macOS uses the eval command for processing arguments passed to the launch.ch script to start the application. A remote attacker can pass specially crafted input to the application and execute arbitrary OS commands on the system.

Note, the vulnerability can be exploited against the Ghidra client application running as a service on a remote machine and passed untrusted input directly as a Ghidra command line argument.


Remediation

Install update from vendor's website.