CVE-2023-39346

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-39346
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-39346.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-39346
Aliases
  • GHSA-63c3-r9qm-c2wx
Published
2023-08-04T20:33:27.601Z
Modified
2025-12-05T00:00:00.373876Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
bjrjk/LinuxASMCallGraph before commit 20dba06 allows attackers to cause a RCE on the server side via uploading a crafted ZIP file due to incorrect filtering rules of uploaded file
Details

LinuxASMCallGraph is software for drawing the call graph of the programming code. Linux ASMCallGraph before commit 20dba06bd1a3cf260612d4f21547c25002121cd5 allows attackers to cause a remote code execution on the server side via uploading a crafted ZIP file due to incorrect filtering rules of uploaded file. The problem has been patched in commit 20dba06bd1a3cf260612d4f21547c25002121cd5. There are no known workarounds.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/39xxx/CVE-2023-39346.json",
    "cwe_ids": [
        "CWE-434"
    ]
}
References

Affected packages

Git / github.com/bjrjk/linuxasmcallgraph

Affected ranges

Type
GIT
Repo
https://github.com/bjrjk/linuxasmcallgraph
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed