{"api_version":"1","generated_at":"2026-04-23T04:34:12+00:00","cve":"CVE-2019-13638","urls":{"html":"https://cve.report/CVE-2019-13638","api":"https://cve.report/api/cve/CVE-2019-13638.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-13638","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-13638"},"summary":{"title":"CVE-2019-13638","description":"GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2019-07-26 13:15:00","updated_at":"2023-11-07 03:03:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://security-tracker.debian.org/tracker/CVE-2019-13638","name":"https://security-tracker.debian.org/tracker/CVE-2019-13638","refsource":"MISC","tags":["Third Party Advisory"],"title":"CVE-2019-13638","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:2798","name":"RHSA-2019:2798","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3758","name":"RHSA-2019:3758","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/","name":"FEDORA-2019-ac709da87f","refsource":"","tags":[],"title":"[SECURITY] Fedora 30 Update: patch-2.7.6-11.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20190828-0001/","name":"https://security.netapp.com/advisory/ntap-20190828-0001/","refsource":"CONFIRM","tags":[],"title":"August 2019 GNU patch Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2019/dsa-4489","name":"DSA-4489","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-4489-1 patch","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/bugtraq/2019/Aug/29","name":"20190816 Details about recent GNU patch vulnerabilities","refsource":"BUGTRAQ","tags":[],"title":"Bugtraq: Details about recent GNU patch vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/bugtraq/2019/Jul/54","name":"20190730 [SECURITY] [DSA 4489-1] patch security update","refsource":"BUGTRAQ","tags":["Mailing List","Third Party Advisory"],"title":"Bugtraq: [SECURITY] [DSA 4489-1] patch security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/irsl/gnu-patch-vulnerabilities","name":"https://github.com/irsl/gnu-patch-vulnerabilities","refsource":"MISC","tags":[],"title":"GitHub - irsl/gnu-patch-vulnerabilities: The GNU patch utility was prone vulnerable to multiple attacks through version 2.7.6. You can find my related PoC files here.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:2964","name":"RHSA-2019:2964","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3757","name":"RHSA-2019:3757","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:4061","name":"RHSA-2019:4061","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0","name":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0","refsource":"MISC","tags":["Mailing List","Patch","Vendor Advisory"],"title":"patch.git - GNU patch","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/","name":"FEDORA-2019-ac709da87f","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 30 Update: patch-2.7.6-11.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201908-22","name":"GLSA-201908-22","refsource":"GENTOO","tags":[],"title":"Patch: Multiple vulnerabilities (GLSA 201908-22) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html","name":"http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html","refsource":"MISC","tags":[],"title":"GNU patch Command Injection / Directory Traversal ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-13638","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-13638","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"patch","cpe6":"2.7.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"13638","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"patch","cpe6":"2.7.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-13638","qid":"296079","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 15.5.0 Missing (CPUOCT2019)"},{"cve":"CVE-2019-13638","qid":"377009","title":"Alibaba Cloud Linux Security Update for patch (ALINUX2-SA-2019:0114)"},{"cve":"CVE-2019-13638","qid":"378297","title":"Virtuozzo Linux Security Update for patch (VZLSA-2019:2964)"},{"cve":"CVE-2019-13638","qid":"500513","title":"Alpine Linux Security Update for patch"},{"cve":"CVE-2019-13638","qid":"504272","title":"Alpine Linux Security Update for patch"},{"cve":"CVE-2019-13638","qid":"671067","title":"EulerOS Security Update for patch (EulerOS-SA-2019-2645)"},{"cve":"CVE-2019-13638","qid":"900088","title":"CBL-Mariner Linux Security Update for patch 2.7.6"},{"cve":"CVE-2019-13638","qid":"901475","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for patch (6790-1)"},{"cve":"CVE-2019-13638","qid":"903211","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for patch (2563)"},{"cve":"CVE-2019-13638","qid":"906212","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for patch (2563-1)"},{"cve":"CVE-2019-13638","qid":"906275","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for patch (6790-2)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2019-13638","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://security-tracker.debian.org/tracker/CVE-2019-13638","refsource":"MISC","name":"https://security-tracker.debian.org/tracker/CVE-2019-13638"},{"refsource":"MISC","name":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0","url":"https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0"},{"refsource":"DEBIAN","name":"DSA-4489","url":"https://www.debian.org/security/2019/dsa-4489"},{"refsource":"BUGTRAQ","name":"20190730 [SECURITY] [DSA 4489-1] patch security update","url":"https://seclists.org/bugtraq/2019/Jul/54"},{"refsource":"BUGTRAQ","name":"20190816 Details about recent GNU patch vulnerabilities","url":"https://seclists.org/bugtraq/2019/Aug/29"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html","url":"http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html"},{"refsource":"GENTOO","name":"GLSA-201908-22","url":"https://security.gentoo.org/glsa/201908-22"},{"refsource":"FEDORA","name":"FEDORA-2019-ac709da87f","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20190828-0001/","url":"https://security.netapp.com/advisory/ntap-20190828-0001/"},{"refsource":"MISC","name":"https://github.com/irsl/gnu-patch-vulnerabilities","url":"https://github.com/irsl/gnu-patch-vulnerabilities"},{"refsource":"REDHAT","name":"RHSA-2019:2798","url":"https://access.redhat.com/errata/RHSA-2019:2798"},{"refsource":"REDHAT","name":"RHSA-2019:2964","url":"https://access.redhat.com/errata/RHSA-2019:2964"},{"refsource":"REDHAT","name":"RHSA-2019:3757","url":"https://access.redhat.com/errata/RHSA-2019:3757"},{"refsource":"REDHAT","name":"RHSA-2019:3758","url":"https://access.redhat.com/errata/RHSA-2019:3758"},{"refsource":"REDHAT","name":"RHSA-2019:4061","url":"https://access.redhat.com/errata/RHSA-2019:4061"}]}},"nvd":{"publishedDate":"2019-07-26 13:15:00","lastModifiedDate":"2023-11-07 03:03:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9.3},"severity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:patch:2.7.6:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"13638","Ordinal":"152492","Title":"CVE-2019-13638","CVE":"CVE-2019-13638","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"13638","Ordinal":"1","NoteData":"GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters. The ed editor does not need to be present on the vulnerable system. This is different from CVE-2018-1000156.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"13638","Ordinal":"2","NoteData":"2019-07-26","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"13638","Ordinal":"3","NoteData":"2019-12-03","Type":"Other","Title":"Modified"}]}}}