A code injection vulnerability has been identified in the Robot Operating System (ROS) 'roslaunch' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code.
References
Link | Resource |
---|---|
https://www.ros.org/blog/noetic-eol/ |
Configurations
No configuration.
History
17 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-17 20:15
Updated : 2025-07-17 21:15
NVD link : CVE-2024-39835
Mitre link : CVE-2024-39835
CVE.ORG link : CVE-2024-39835
JSON object : View
Products Affected
No product.