NA

CVE-2024-23749

Published: 09/02/2024 Updated: 14/02/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an malicious user to add inputs inside the filename variable, leading to arbitrary code execution.

Vulnerable Product Search on Vulmon Subscribe to Product

9bis kitty

Exploits

KiTTY versions 076113 and below suffer from a command injection vulnerability when getting a remote file through scp It appears to leverage an ANSI escape sequence issue which is quite an interesting vector of attack ...