VulnerAlert



APPLICATION
PROGRAMMING LANGUAGE
SYSTEMS
26-02-2026 23:33

CVE-2026-28207 Vulnerabilidad documentada

Sin puntuación
Tags
#injection
#where
#using
#list
#config
#systems
#programming language
#application
#vulnerability
#attackers
#arbitrary
#privilege
#pass
#inject
#fix
#execution
#execute
#configuration
#allow
#attack
Descripción
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior version 0.4.2, command injection vulnerability (CWE-78) in the Zen compiler allows local attackers execute arbitrary shell commands by providing specially crafted output filename via `-o` command-line argument. The existed `main` application logic (specifically `src/main.c`), where constructed string invoke backend compiler. This was built concatenating various arguments, including user-controlled filename, and subsequently executed using `system()` function. Because invokes parse command, metacharacters within were interpreted shell, leading execution. An attacker who can influence arguments passed `zc` (like through build script or CI/CD pipeline configuration) with privileges of user running has been fixed 0.4.2 removing calls, implementing `ArgList`, internal argument handling. Users are advised update v0.4.2 later.
https://github.com/z-libs/Zen-C/security/advisories/GHSA-9rff-x96h-76h2
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2026-28207
Resultados similares
Coincidentes en almenos en 50% de los tags
16-03-2026 CVE-2016-20030
ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows unauthenticated ...
Ver información
16-03-2026 CVE-2016-20029
ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers ...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por