提出 #786061: OFFIS DCMTK up to 3.7.0 OS Command Injection情報

タイトルOFFIS DCMTK up to 3.7.0 OS Command Injection
説明An OS command injection vulnerability was identified in OFFIS DCMTK up to 3.7.0 in the storescp application. When configured with --exec-on-reception or --exec-on-eostudy, the placeholders #f (filename), #p (path), and #r (reverse DNS hostname) are derived from attacker-controlled input and passed to /bin/sh -c without adequate sanitization of shell metacharacters. This allows unauthenticated remote code execution via a crafted DICOM C-STORE request. The fix applies the existing sanitizeAETitle() character allowlist to these placeholders. This vulnerability was coordinated with OFFIS. The fix has been committed to the DCMTK testing branch (https://github.com/DCMTK/dcmtk/commit/edbb085e45788dccaf0e64d71534cfca925784b8) and is expected to be merged into the public master branch shortly. Our advisory and the OFFIS issue tracker entry (https://support.dcmtk.org/redmine/issues/1194) are intentionally not yet public and will be published once the CVE has been assigned. The vulnerability was found by Simon Weber and Volker Schönefeld (Machine Spirits)
ソース⚠️ https://machinespirits.com/advisory/2e1627/
ユーザー
 simon4machinespirits (UID 96718)
送信2026年03月23日 10:01 (17 日 ago)
モデレーション2026年04月06日 09:55 (14 days later)
ステータス承諾済み
VulDBエントリ355486 [OFFIS DCMTK 迄 3.7.0 storescp dcmnet/apps/storescp.cc executeOnReception/executeOnEndOfStudy 特権昇格]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!