An issue in Mintty v.3.6.4 and before allows a remote attacker to execute arbitrary code via crafted commands to the terminal.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before inserting the input into an executable resource, such as a library, configuration file, or template.
Link | Tags |
---|---|
https://dgl.cx/2023/09/ansi-terminal-security#mintty-osc50 | third party advisory |