CVE-2024-36138

Source
https://cve.org/CVERecord?id=CVE-2024-36138
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36138.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36138
Aliases
Downstream
Related
Published
2024-09-07T16:15:02Z
Modified
2026-02-04T04:30:16.377562Z
Summary
[none]
Details

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via childprocess.spawn / childprocess.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

References

Affected packages