# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/ohmyzsh/ohmyzsh/commit/72928432 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: @huntrdev
Published: 2021-11-30T09:30:17
Updated: 2024-08-03T17:01:08.331Z
Reserved: 2021-08-19T00:00:00
Link: CVE-2021-3727
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2021-11-30T10:15:08.940
Modified: 2021-12-01T08:05:03.300
Link: CVE-2021-3727
Redhat
No data.