less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
{ "vanir_signatures": [ { "digest": { "function_hash": "21512441872404318376774822434280745476", "length": 846.0 }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-32487-3e056bdc", "source": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33", "signature_type": "Function", "target": { "function": "shell_quoten", "file": "filename.c" } }, { "digest": { "line_hashes": [ "6392856912888587988469121716084137540", "270698381364005912365080033924923909128", "318074949332500423466599373294260241169", "328415284983022296077022486907155490794", "289737217164822785345111873191726688282", "189455528938103306586446648766268305176", "218584657416246573268543105314978548151", "183112455831047898812042513852324344280", "189813269534570981535526249696743330997", "320490191076196738139528607302830583836", "313537205324788312003463297808254168523", "71429175339232634504927653181210309974", "96387650130909143470870128363097199606", "255033481903084783363520326276290220715", "151725255370670263930159020310191496177", "25140373869608485903155282993232658089", "97183714326804796251507833940305662688", "149680852007861882086952961165833901061", "78485727664940003197033471613650392146", "231954030887503870082288013121597790953" ], "threshold": 0.9 }, "deprecated": false, "signature_version": "v1", "id": "CVE-2024-32487-902a445c", "source": "https://github.com/gwsw/less/commit/007521ac3c95bc76e3d59c6dbfe75d06c8075c33", "signature_type": "Line", "target": { "file": "filename.c" } } ] }