radare2 is vulnerable to command injection. A command injection vulnerability exists in the function bin_symbols()
in libr/core/cbin.c
. An attacker is able to execute arbitrary shell commands using a malicious executable file due to improper handling of symbol names embedded in executables.
bananamafia.dev/post/r2-pwndebian/
github.com/radare/radare2/pull/14690
github.com/radare/radare2/releases/tag/3.7.0
lists.fedoraproject.org/archives/list/[email protected]/message/ETWG4VKHWL5F74L3QBBKSCOXHSRNSRRT/
lists.fedoraproject.org/archives/list/[email protected]/message/MGA2PVBFA6VPWWLMBGWVBESHAJBQ7OXJ/
lists.fedoraproject.org/archives/list/[email protected]/message/RQO7V37RGQEKZDLY2JYKDZTLNN2YUBC5/