The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document. Reference: https://tracker.freecad.org/view.php?id=4810
Created freecad tracking bugs for this issue: Affects: epel-7 [bug 2046350] Affects: fedora-all [bug 2046349]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.