# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://github.com/ohmyzsh/ohmyzsh/commit/72928432 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2024-08-03T17:01:08.331Z
Reserved: 2021-08-19T00:00:00
Link: CVE-2021-3727

No data.

Status : Modified
Published: 2021-11-30T10:15:08.940
Modified: 2024-11-21T06:22:15.777
Link: CVE-2021-3727

No data.

No data.