CVE-2024-32487

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
Configurations

Configuration 1 (hide)

cpe:2.3:a:greenwoodsoftware:less:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-04-13 15:15

Updated : 2025-06-17 20:58


NVD link : CVE-2024-32487

Mitre link : CVE-2024-32487

CVE.ORG link : CVE-2024-32487


JSON object : View

Products Affected

debian

  • debian_linux

netapp

  • hci_compute_node
  • hci_storage_nodes
  • solidfire
  • bootstrap_os

greenwoodsoftware

  • less
CWE
CWE-96

Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')