Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/netblue30/firejail/ | third party advisory |
https://www.debian.org/security/2020/dsa-4742 | third party advisory vendor advisory |
https://www.debian.org/security/2020/dsa-4743 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00036.html | mailing list third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00033.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W66IR5YT4KG464SKEMQN2NP2LGATGEGS/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JFXN3JJG4DIMN4TAHOTKFMS7SGM4EOTR/ | vendor advisory |
https://security.gentoo.org/glsa/202101-02 | third party advisory vendor advisory |