Hi, I am forwarding this finding because the vulnerability seems exists in the busybox. I’d like to confirm if it is a known issue. I have tested it with busybox 1.28.1 (this is the latest binary I can find from https://busybox.net/downloads/binaries/) and executed the PoC in a simplest Linux at https://bellard.org/jslinux/vm.html?url=https://bellard.org/jslinux/buildroot-x86.cfg (From https://bellard.org/jslinux/index.html). The details are encrypted with Denys’ public key (https://busybox.net/~vda/vda_pubkey.gpg). I've emailed to busybox@busybox.net, but no respond. So I created this bug. Thanks for your time, Zhouyuan
Created attachment 7711 [details] PoC, encrypted with Denys’ public key
Created attachment 7716 [details] PoC, encrypted with Denys’ public key
Created attachment 7721 [details] PoC, encrypted with Denys’ public key
Created attachment 7726 [details] PoC, encrypted with Denys’ public key
Created attachment 7731 [details] PoC, encrypted with Denys’ public key
Hi, Any news? I just change the component and importance.
Tested with 1.29.3 on TinyCore Linux, PoC works.
Created attachment 7786 [details] Report
Already fixed by this commit: commit c3797d40a1c57352192c6106cc0f435e7d9c11e8 Author: Denys Vlasenko <vda.linux@googlemail.com> Date: Tue Nov 7 18:09:29 2017 +0100 lineedit: do not tab-complete any strings which have control characters
Thanks for the confirmation.