The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://tracker.freecad.org/view.php?id=4810 | patch exploit vendor advisory issue tracking |
https://github.com/FreeCAD/FreeCAD/pull/5306 | patch vendor advisory |
https://www.debian.org/security/2022/dsa-5229 | third party advisory vendor advisory |