# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).
References
Link | Resource |
---|---|
https://github.com/ohmyzsh/ohmyzsh/commit/72928432 | Patch Third Party Advisory |
Configurations
History
01 Dec 2021, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/ohmyzsh/ohmyzsh/commit/72928432 - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:a:planetargon:oh_my_zsh:*:*:*:*:*:*:*:* |
30 Nov 2021, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-30 10:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-3727
Mitre link : CVE-2021-3727
CVE.ORG link : CVE-2021-3727
JSON object : View
Products Affected
planetargon
- oh_my_zsh
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')