First published: Mon Jul 20 2020(Updated: )
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
radare2 | <4.5.0 | |
Fedora | =31 | |
Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15121 is considered a high severity vulnerability due to its potential for shell injection.
To fix CVE-2020-15121, upgrade to radare2 version 4.5.0 or later.
The impact of CVE-2020-15121 includes execution of arbitrary commands via shell injection.
All versions of radare2 prior to 4.5.0 are affected by CVE-2020-15121.
Yes, CVE-2020-15121 can be exploited remotely if a malicious PDB file is hosted.