# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/ohmyzsh/ohmyzsh/commit/72928432 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2024-08-03T17:01:08.331Z
Reserved: 2021-08-19T00:00:00
Link: CVE-2021-3727

No data.

Status : Modified
Published: 2021-11-30T10:15:08.940
Modified: 2024-11-21T06:22:15.777
Link: CVE-2021-3727

No data.