| ID | 
        
          CVE-2024-53256
         | 
      
      
          | Sažetak | 
        Rizin is a UNIX-like reverse engineering framework and command-line toolset. `rizin.c` still had an old snippet of code which suffered a command injection due the usage of `rz_core_cmdf` to invoke the command `m` which was removed in v0.1.x. A malicious binary defining `bclass` (part of RzBinInfo) is executed if `rclass` (part of RzBinInfo) is set to `fs`; the vulnerability can be exploited by any bin format where `bclass` and `rclass` are user defined. This vulnerability is fixed in 0.7.4. | 
      
      
          | Reference | 
        
          
         | 
      
      
        | CVSS | 
        
          
              | Base:           | 7.8 |  
              | Impact:         | 5.9 |  
              | Exploitability: | 1.8 |  
           
         | 
      
    
        | Pristup | 
        
        
            | Vektor | Složenost | Autentikacija |  
            
            | LOCAL | 
            LOW | 
            LOW | 
             
         
         | 
    
      
        | Impact | 
        
        
            | Povjerljivost | Cjelovitost | Dostupnost |  
            
            | HIGH | 
            HIGH | 
            HIGH | 
             
         
         | 
    
    
        | CVSS vektor | 
        CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
      
      
          | Zadnje važnije ažuriranje | 
          
            23-12-2024 - 16:15 | 
          
      
      
          | Objavljeno | 
          
            23-12-2024 - 16:15 |