OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows attackers to execute arbitrary commands via a crafted value to the m parameter. NOTE: third parties have disputed this because there is no analysis showing that the backtick command executes outside the context of the user account that entered the command line.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.binaryworld.it/ | vendor advisory exploit |
https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639 | broken link |
http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html |