In KDE KCoreAddons before 6.25, KShell::quoteArgs is intended to safely quote arguments so that they can be passed to a shell command. This parsing does not adequately handle metacharacters, leading to an escape from the shell. All applications relying on this method in a security-critical path to handle user input are affected and could be exploited. In particular, because sendInput() sends a string to a terminal, a control character such as \x01 can be used during injection.
| Vendor | Product | Versions |
|---|---|---|
| kde | kcoreaddons | 0 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| open source | kde | cert_advisory | 90% |
Updated affected versions to include 6.24, changed severity to CRITICAL, and corrected exploit availability to false.
Initial creation