{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-4515","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-04-14T18:14:57.235Z","dateReserved":"2022-12-15T00:00:00.000Z","datePublished":"2022-12-20T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-12-31T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A flaw was found in Exuberant Ctags in the way it handles the \"-o\" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way."}],"affected":[{"vendor":"n/a","product":"Exuberant Ctags","versions":[{"version":"All versions are affected","status":"affected"}]}],"references":[{"url":"https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56"},{"name":"[debian-lts-announce] 20221231 [SECURITY] [DLA 3254-1] exuberant-ctags security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00040.html"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78","cweId":"CWE-78"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:41:45.615Z"},"title":"CVE Program Container","references":[{"url":"https://sourceforge.net/p/ctags/code/HEAD/tree/tags/ctags-5.8/sort.c#l56","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20221231 [SECURITY] [DLA 3254-1] exuberant-ctags security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/12/msg00040.html"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T17:25:51.664544Z","id":"CVE-2022-4515","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-14T18:14:57.235Z"}}]}}