Description
Rizin is a UNIX-like reverse engineering framework and command-line toolset. `rizin.c` still had an old snippet of code which suffered a command injection due the usage of `rz_core_cmdf` to invoke the command `m` which was removed in v0.1.x. A malicious binary defining `bclass` (part of RzBinInfo) is executed if `rclass` (part of RzBinInfo) is set to `fs`; the vulnerability can be exploited by any bin format where `bclass` and `rclass` are user defined. This vulnerability is fixed in 0.7.4.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/rizinorg/rizin/security/advisories/GHSA-5jhc-frm4-p8v9
Patch x_refsource_misc
https://github.com/rizinorg/rizin/commit/db6c5b39c065ce719f587c9815c47fbb834b10fa
Various Sources x_refsource_misc
https://github.com/rizinorg/rizin/blob/be24ca8879ed9c58f288bdf21c271b6294720da4/librz/main/rizin.c#L1275-L1278
Scores
CVSS v3
7.8
EPSS
0.0032
EPSS Percentile
54.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (1)
rizinorg/rizin
< 0.7.4
Published
Dec 23, 2024
Tracked Since
Feb 18, 2026