CVE-2024-36138

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36138
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36138.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36138
Aliases
Downstream
Related
Published
2024-09-07T16:15:02Z
Modified
2025-05-30T18:00:04Z
Summary
[none]
Details

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via childprocess.spawn / childprocess.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

References

Affected packages