CVE-2023-28617
Published on: Not Yet Published
Last Modified on: 03/20/2023 02:46:00 AM UTC
The following vulnerability was found:
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
- CVE-2023-28617 has been assigned by
[email protected] to track the vulnerability
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[PATCH] Fix ob-latex.el command injection vulnerability. | list.orgmode.org text/html |
![]() |
emacs/org-mode.git - Emacs Org mode | git.savannah.gnu.org text/html |
![]() |
emacs/org-mode.git - Emacs Org mode | git.savannah.gnu.org text/html |
![]() |
There are currently no QIDs associated with this CVE
There are no known software configurations (CPEs) currently associated with this CVE
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-28617 : org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to… twitter.com/i/web/status/1… | 2023-03-19 03:04:53 |
![]() |
Potentially Critical CVE Detected! CVE-2023-28617 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1… twitter.com/i/web/status/1… | 2023-03-19 04:56:00 |
![]() |
CVE-2023-28617 | 2023-03-19 04:38:48 |