KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2024/Feb/13 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Feb/14 | Exploit Mailing List Third Party Advisory |
https://blog.defcesco.io/CVE-2024-23749 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2024-02-09T00:00:00
Updated: 2024-02-14T04:06:00.298140
Reserved: 2024-01-21T00:00:00
Link: CVE-2024-23749
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-02-09T08:15:08.530
Modified: 2024-02-14T13:59:39.353
Link: CVE-2024-23749
JSON object: View
Redhat Information
No data.
CWE