The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "freecad", "binary_version": "1.0.0+dfsg-5build1" }, { "binary_name": "freecad-common", "binary_version": "1.0.0+dfsg-5build1" }, { "binary_name": "freecad-python3", "binary_version": "1.0.0+dfsg-5build1" }, { "binary_name": "freecad-python3-dbgsym", "binary_version": "1.0.0+dfsg-5build1" }, { "binary_name": "libfreecad-python3", "binary_version": "1.0.0+dfsg-5build1" }, { "binary_name": "libfreecad-python3-dbgsym", "binary_version": "1.0.0+dfsg-5build1" } ] }