The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.21.2+dfsg1-5", "binary_name": "freecad" }, { "binary_version": "0.21.2+dfsg1-5", "binary_name": "freecad-common" }, { "binary_version": "0.21.2+dfsg1-5", "binary_name": "freecad-python3" }, { "binary_version": "0.21.2+dfsg1-5", "binary_name": "freecad-python3-dbgsym" }, { "binary_version": "0.21.2+dfsg1-5", "binary_name": "libfreecad-python3-0.20" }, { "binary_version": "0.21.2+dfsg1-5", "binary_name": "libfreecad-python3-0.20-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.0.0+dfsg-5build1", "binary_name": "freecad" }, { "binary_version": "1.0.0+dfsg-5build1", "binary_name": "freecad-common" }, { "binary_version": "1.0.0+dfsg-5build1", "binary_name": "freecad-python3" }, { "binary_version": "1.0.0+dfsg-5build1", "binary_name": "freecad-python3-dbgsym" }, { "binary_version": "1.0.0+dfsg-5build1", "binary_name": "libfreecad-python3" }, { "binary_version": "1.0.0+dfsg-5build1", "binary_name": "libfreecad-python3-dbgsym" } ] }