Vulnerability Description
The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freecadweb | Freecad | 0.19 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://github.com/FreeCAD/FreeCAD/pull/5306PatchVendor Advisory
- https://tracker.freecad.org/view.php?id=4810ExploitIssue TrackingPatch
- https://www.debian.org/security/2022/dsa-5229Third Party Advisory
- https://github.com/FreeCAD/FreeCAD/pull/5306PatchVendor Advisory
- https://tracker.freecad.org/view.php?id=4810ExploitIssue TrackingPatch
- https://www.debian.org/security/2022/dsa-5229Third Party Advisory
FAQ
What is CVE-2021-45845?
CVE-2021-45845 is a vulnerability with a CVSS score of 7.8 (HIGH). The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.
How severe is CVE-2021-45845?
CVE-2021-45845 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-45845?
Check the references section above for vendor advisories and patch information. Affected products include: Freecadweb Freecad, Debian Debian Linux.