rizin before v0.6.3 is vulnerable to Improper Neutralization of Special Elements via meta_set function in librz/analysis/meta.
References
Link | Resource |
---|---|
https://gist.github.com/Crispy-fried-chicken/cb0b3a653a43a2fe2361641eddd8330d | Third Party Advisory |
https://github.com/rizinorg/rizin/commit/c025dcee40c8eac2ab559f2caa3798a2dbf019e4 | Patch |
Configurations
History
03 Jul 2025, 00:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Crispy-fried-chicken/cb0b3a653a43a2fe2361641eddd8330d - Third Party Advisory | |
References | () https://github.com/rizinorg/rizin/commit/c025dcee40c8eac2ab559f2caa3798a2dbf019e4 - Patch | |
First Time |
Rizin rizin
Rizin |
|
CPE | cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:* |
18 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-17 22:15
Updated : 2025-07-03 00:30
NVD link : CVE-2024-31668
Mitre link : CVE-2024-31668
CVE.ORG link : CVE-2024-31668
JSON object : View
Products Affected
rizin
- rizin
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')