CVE-2012-5534

The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:flashtux:weechat:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.4:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.8:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.9:*:*:*:*:*:*:*
cpe:2.3:a:flashtux:weechat:0.3.9.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-12-03 21:55

Updated : 2024-02-04 18:16


NVD link : CVE-2012-5534

Mitre link : CVE-2012-5534

CVE.ORG link : CVE-2012-5534


JSON object : View

Products Affected

flashtux

  • weechat
CWE
CWE-20

Improper Input Validation