Home

Description

Rizin is a UNIX-like reverse engineering framework and command-line toolset. `rizin.c` still had an old snippet of code which suffered a command injection due the usage of `rz_core_cmdf` to invoke the command `m` which was removed in v0.1.x. A malicious binary defining `bclass` (part of RzBinInfo) is executed if `rclass` (part of RzBinInfo) is set to `fs`; the vulnerability can be exploited by any bin format where `bclass` and `rclass` are user defined. This vulnerability is fixed in 0.7.4.

PUBLISHED Reserved 2024-11-19 | Published 2024-12-23 | Updated 2024-12-24 | Assigner GitHub_M




HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

< 0.7.4
affected

References

github.com/.../rizin/security/advisories/GHSA-5jhc-frm4-p8v9

github.com/...ommit/db6c5b39c065ce719f587c9815c47fbb834b10fa

github.com/...c58f288bdf21c271b6294720da4/librz/main/rizin.c

cve.org (CVE-2024-53256)

nvd.nist.gov (CVE-2024-53256)

Download JSON