CVE-2022-41751 Jhead 3.06.0.1 allows attackers to execute arbitrary OS commands by placing commands in a JPEG filename and using the regeneration option.

When parsing a JPEG file, the Jhead application will look for the string "COMMAND: \r

" at the beginning of the file and then execute the following command: /bin/bash -c 'eval "$(echo " $(basename $1)")"' When parsing a JPEG file, the Jhead application will look for the string "" at the beginning of the file and then execute the following command: /bin/bash -c 'eval "$(echo ""')"' CVE-2018-1000111: This issue is currently rated as Medium severity due to the fact that it can be exploited by an attacker to execute arbitrary commands. It should be noted that Jhead 3.06.0.1 is not widely used, making it likely that not many people are at risk of being affected by this issue. However, it is still important to upgrade to the latest version of Jhead as soon as possible.

Summary of CVE-2018-1000111

The vulnerability is caused by an error in the Jhead application when parsing a JPEG file.
When parsing a JPEG file, the Jhead application will look for the string "COMMAND: \r
" at the beginning of the file and then execute the following command: /bin/bash -c 'eval "$(echo " $(basename $1)")"' When parsing a JPEG file, the Jhead application will look for the string "" at the beginning of the file and then execute the following command: /bin/bash -c 'eval "$(echo ""')"'

Timeline

Published on: 10/17/2022 18:15:00 UTC
Last modified on: 10/26/2022 20:15:00 UTC

References