Bug 2274980 (CVE-2024-32487) - CVE-2024-32487 less: OS command injection
Summary: CVE-2024-32487 less: OS command injection
Keywords:
Status: NEW
Alias: CVE-2024-32487
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2274981
Blocks: 2274983
TreeView+ depends on / blocked
 
Reported: 2024-04-14 14:03 UTC by ybuenos
Modified: 2024-04-23 20:55 UTC (History)
0 users

Fixed In Version:
Doc Type: ---
Doc Text:
An OS command injection flaw was found in Less. Since quoting is mishandled in filename.c, opening files with attacker-controlled file names can lead to OS command execution. Exploitation requires the LESSOPEN environment variable, but this is set by default in many common cases.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description ybuenos 2024-04-14 14:03:02 UTC
less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.

https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33
https://www.openwall.com/lists/oss-security/2024/04/12/5
https://www.openwall.com/lists/oss-security/2024/04/13/2

Comment 1 ybuenos 2024-04-14 14:03:17 UTC
Created less tracking bugs for this issue:

Affects: fedora-all [bug 2274981]


Note You need to log in before you can comment on or make changes to this bug.