Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-48337


GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.


Published

2023-02-20T23:15:12.243

Last Modified

2025-03-18T16:15:14.647

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-78
  • Type: Secondary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu emacs ≤ 28.2 Yes
Operating System debian debian_linux 11.0 Yes

References