# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: @huntrdev

Published:

Updated: 2024-08-03T17:01:08.331Z

Reserved: 2021-08-19T00:00:00

Link: CVE-2021-3727

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-30T10:15:08.940

Modified: 2024-11-21T06:22:15.777

Link: CVE-2021-3727

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.