KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-15T19:40:16.829Z
Reserved: 2024-01-21T00:00:00.000Z
Link: CVE-2024-23749
Updated: 2024-08-01T23:13:07.434Z
Status : Modified
Published: 2024-02-09T08:15:08.530
Modified: 2025-05-15T20:15:44.290
Link: CVE-2024-23749
No data.
OpenCVE Enrichment
No data.