less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
[
{
"signature_version": "v1",
"source": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33",
"signature_type": "Function",
"target": {
"function": "shell_quoten",
"file": "filename.c"
},
"id": "CVE-2024-32487-3e056bdc",
"digest": {
"length": 846.0,
"function_hash": "21512441872404318376774822434280745476"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33",
"signature_type": "Line",
"target": {
"file": "filename.c"
},
"id": "CVE-2024-32487-902a445c",
"digest": {
"line_hashes": [
"6392856912888587988469121716084137540",
"270698381364005912365080033924923909128",
"318074949332500423466599373294260241169",
"328415284983022296077022486907155490794",
"289737217164822785345111873191726688282",
"189455528938103306586446648766268305176",
"218584657416246573268543105314978548151",
"183112455831047898812042513852324344280",
"189813269534570981535526249696743330997",
"320490191076196738139528607302830583836",
"313537205324788312003463297808254168523",
"71429175339232634504927653181210309974",
"96387650130909143470870128363097199606",
"255033481903084783363520326276290220715",
"151725255370670263930159020310191496177",
"25140373869608485903155282993232658089",
"97183714326804796251507833940305662688",
"149680852007861882086952961165833901061",
"78485727664940003197033471613650392146",
"231954030887503870082288013121597790953"
],
"threshold": 0.9
},
"deprecated": false
}
]