ack 2.00 through 2.11_02 allows remote attackers to execute arbitrary code via a (1) --pager, (2) --regex, or (3) --output option in a .ackrc file in a directory to be searched.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/55982 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-01/msg00094.html | vendor advisory |
http://www.securityfocus.com/bid/64196 | vdb entry |
https://github.com/petdance/ack2/issues/399 | |
http://seclists.org/oss-sec/2013/q4/484 | mailing list |