PRIOn Logo

CVE-2024-39331 Command injection

Routine
Remediate Within 6 Months

CVE Information

Original CVE data

Published:
Updated:

In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.

CWE:
CVSS v2-
CVSS v3-
References
https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29
https://list.orgmode.org/87sex5gdqc.fsf%40localhost/
https://lists.gnu.org/archive/html/info-gnu-emacs/2024-06/msg00000.html
https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=f4cc61636947b5c2f0afc67174dd369fe3277aa8
https://www.openwall.com/lists/oss-security/2024/06/23/1
https://www.openwall.com/lists/oss-security/2024/06/23/2
https://news.ycombinator.com/item?id=40768225
https://lists.debian.org/debian-lts-announce/2024/06/msg00023.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00024.html
Affected Vendors

Basic Analysis

Common vulnerability metrics

Vulnerabilty type as detected by PRIOnengine

Command injection

CVSS Scores as calculated by PRIOnengine
CVSS v29.7
AV:N/AC:L/AU:N/C:C/I:C/A:P
CVSS v39.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
MITRE CWE Top 25

-

Exploits

No exploit code is reported to exist.

Active Exploitation

Vulnerability is not in CISA's Known Exploited Vulnerabilities (KEV) catalog. See the KEV Catalog

Social Network Activity

-

Threat Actor Activity

No sightings of the vulnerability within threat reports.

Cybersecurity Frameworks

How the vulnerability maps against various cybersecurity frameworks

-

Compliance Impact

How the submited vulnerability affects compliance

-

Web Application Security Frameworks

Applicable if the issue likely affects a web application

-