KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
References
Link Resource
http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2024/Feb/13 Exploit Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Feb/14 Exploit Mailing List Third Party Advisory
https://blog.defcesco.io/CVE-2024-23749 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2024-02-09T00:00:00

Updated: 2024-02-14T04:06:00.298140

Reserved: 2024-01-21T00:00:00


Link: CVE-2024-23749

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2024-02-09T08:15:08.530

Modified: 2024-02-14T13:59:39.353


Link: CVE-2024-23749

JSON object: View

cve-icon Redhat Information

No data.

CWE