OS Command Injection in GNU patch - CVE-2018-20969
Published: August 27, 2019
GNU patch
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to the "do_ed_script" function in the "pch.c" file does not block strings beginning with a ! character. A remote unauthenticated attacker can trick a victim to open a specially crafted patch file and execute arbitrary OS shell commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.