Description
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Product status
Any version
3.3.0-rc1 (semver)
Credits
Mobasi Security Team
References
github.com/tclahr/uac/pull/443 (Pull Request)
github.com/...ommit/cb95d7166cd47908e1189d9669e43f9a6d3d707f (Patch Commit #1)
github.com/...ommit/50ace60e172e38feb78347bdf579311c23eff078 (Patch Commit #2)
github.com/...ommit/d0fca5e36d8d6a33a4404f0f6fe92b0424544589 (Patch Commit #3)
github.com/tclahr/uac/issues/429 (Related Issue)
mobasi.ai/sentinel (Mobasi Sentinel Vulnerability Index)
www.vulncheck.com/...-injection-via-placeholder-substitution (VulnCheck Advisory: UAC < 3.3.0-rc1 Command Injection via Placeholder Substitution)