Description
Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
Problem types
CWE-78 Improper neutralization of special elements used in an OS command (‘OS command injection’)
Product status
Any version before 12.0.3
Credits
Mobasi Security Team
todb of AHA!
References
takeonme.org/…00000000000000000000000000000000000000000110
github.com/…ghidra/security/advisories/GHSA-mc3p-mq2p-xw6v
