CVE-2024-38396

An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
Configurations

No configuration.

History

03 Jul 2024, 02:04

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-94

17 Jun 2024, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/06/17/1 -

17 Jun 2024, 12:42

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en iTerm2 3.5.x anterior a 3.5.2. El uso sin filtrar de una secuencia de escape para informar el título de una ventana, en combinación con la función de integración tmux incorporada (habilitada de forma predeterminada), permite a un atacante inyectar código arbitrario en la terminal, una vulnerabilidad diferente a CVE-2024-38395.

16 Jun 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-16 21:15

Updated : 2024-07-03 02:04


NVD link : CVE-2024-38396

Mitre link : CVE-2024-38396

CVE.ORG link : CVE-2024-38396


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')