We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Rizin is a UNIX-like reverse engineering framework and command-line toolset. `rizin.c` still had an old snippet of code which suffered a command injection due the usage of `rz_core_cmdf` to invoke the command `m` which was removed in v0.1.x. A malicious binary defining `bclass` (part of RzBinInfo) is executed if `rclass` (part of RzBinInfo) is set to `fs`; the vulnerability can be exploited by any bin format where `bclass` and `rclass` are user defined. This vulnerability is fixed in 0.7.4.
Reserved 2024-11-19 | Published 2024-12-23 | Updated 2024-12-24 | Assigner GitHub_MCWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
github.com/.../rizin/security/advisories/GHSA-5jhc-frm4-p8v9
github.com/...ommit/db6c5b39c065ce719f587c9815c47fbb834b10fa
github.com/...c58f288bdf21c271b6294720da4/librz/main/rizin.c
Support options