LinuxASMCallGraph is software for drawing the call graph of the programming code. Linux ASMCallGraph before commit 20dba06bd1a3cf260612d4f21547c25002121cd5 allows attackers to cause a remote code execution on the server side via uploading a crafted ZIP file due to incorrect filtering rules of uploaded file. The problem has been patched in commit 20dba06bd1a3cf260612d4f21547c25002121cd5. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/bjrjk/LinuxASMCallGraph/commit/20dba06bd1a3cf260612d4f21547c25002121cd5 | Patch |
https://github.com/bjrjk/LinuxASMCallGraph/issues/6 | Issue Tracking |
https://github.com/bjrjk/LinuxASMCallGraph/issues/8 | Issue Tracking |
https://github.com/bjrjk/LinuxASMCallGraph/security/advisories/GHSA-63c3-r9qm-c2wx | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-08-04 21:15
Updated : 2023-08-10 19:09
NVD link : CVE-2023-39346
Mitre link : CVE-2023-39346
CVE.ORG link : CVE-2023-39346
JSON object : View
Products Affected
renjikai
- linuxasmcallgraph
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type