First published: Tue Feb 21 2023(Updated: )
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed. <a href="https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=1b4dc4691c1f87fc970fbe568b43869a15ad0d4c">https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=1b4dc4691c1f87fc970fbe568b43869a15ad0d4c</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Emacs | <=28.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2171989 has been classified as high due to the command injection vulnerability.
To fix REDHAT-BUG-2171989, update GNU Emacs to the latest version that addresses this vulnerability.
GNU Emacs versions up to and including 28.2 are affected by REDHAT-BUG-2171989.
REDHAT-BUG-2171989 involves a command injection vulnerability due to unsanitized external inputs in the htmlfontify.el file.
Yes, the vulnerability in REDHAT-BUG-2171989 is associated with the hfy-istext-command function.