CVE-2026-28207

MEDIUM
中文标题:
(暂无数据)
英文标题:
Zen-C Vulnerable to Command Injection via Malicious Output Filename
CVSS分数: 6.6
发布时间: 2026-02-26 22:17:58
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

(暂无数据)

英文描述:

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.2, a command injection vulnerability (CWE-78) in the Zen C compiler allows local attackers to execute arbitrary shell commands by providing a specially crafted output filename via the `-o` command-line argument. The vulnerability existed in the `main` application logic (specifically in `src/main.c`), where the compiler constructed a shell command string to invoke the backend C compiler. This command string was built by concatenating various arguments, including the user-controlled output filename, and was subsequently executed using the `system()` function. Because `system()` invokes a shell to parse and execute the command, shell metacharacters within the output filename were interpreted by the shell, leading to arbitrary command execution. An attacker who can influence the command-line arguments passed to the `zc` compiler (like through a build script or a CI/CD pipeline configuration) can execute arbitrary commands with the privileges of the user running the compiler. The vulnerability has been fixed in version 0.4.2 by removing `system()` calls, implementing `ArgList`, and internal argument handling. Users are advised to update to Zen C version v0.4.2 or later.

CWE类型:
CWE-78
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
z-libs Zen-C < 0.4.2 - - cpe:2.3:a:z-libs:zen-c:<_0.4.2:*:*:*:*:*:*:*
z-libs zen_c * - - cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/z-libs/Zen-C/security/advisories/GHSA-9rff-x96h-76h2 x_refsource_CONFIRM
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (cna)
MEDIUM
6.6
CVSS向量: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
机密性
LOW
完整性
HIGH
可用性
LOW
时间信息
发布时间:
2026-02-26 22:17:58
修改时间:
2026-02-26 22:17:58
创建时间:
2026-02-27 06:00:01
更新时间:
2026-03-03 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-28207 2026-02-27 03:19:47 2026-02-26 22:00:01
NVD nvd_CVE-2026-28207 2026-02-27 02:00:05 2026-02-26 22:00:03
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v4 NVD
2026-03-03 06:00:02
affected_products_count: 1 → 2
查看详细变更
  • affected_products_count: 1 -> 2
v3 NVD
2026-02-28 06:00:03
references_count: 1 → 2
查看详细变更
  • references_count: 1 -> 2
v2 NVD
2026-02-27 06:00:03
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']