A code injection vulnerability has been discovered in the Robot Operating System (ROS) 'rostopic' command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the 'echo' verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code.
References
Link | Resource |
---|---|
https://www.ros.org/blog/noetic-eol/ | Product |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.ros.org/blog/noetic-eol/ - Product | |
CPE | cpe:2.3:o:openrobotics:robot_operating_system:indigo_igloo:*:*:*:*:*:*:* cpe:2.3:o:openrobotics:robot_operating_system:melodic_morenia:*:*:*:*:*:*:* cpe:2.3:o:openrobotics:robot_operating_system:noetic_ninjemys:*:*:*:*:*:*:* cpe:2.3:o:openrobotics:robot_operating_system:kinetic_kame:*:*:*:*:*:*:* |
|
First Time |
Openrobotics
Openrobotics robot Operating System |
|
Summary |
|
17 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-17 20:15
Updated : 2025-08-26 17:51
NVD link : CVE-2024-41921
Mitre link : CVE-2024-41921
CVE.ORG link : CVE-2024-41921
JSON object : View
Products Affected
openrobotics
- robot_operating_system