Code Injection Vulnerability in Robot Operating System's Command-Line Tool
CVE-2024-39835

7.8HIGH

What is CVE-2024-39835?

A code injection flaw has been discovered in the 'roslaunch' command-line tool of the Robot Operating System (ROS), which affects several distributions including Noetic Ninjemys and earlier versions. This vulnerability stems from the improper handling of user-supplied parameters in the eval() method, enabling attackers to introduce and execute arbitrary Python code. By exploiting this flaw through crafted parameter inputs, an adversary could potentially gain unauthorized control over the system and compromise its integrity, thus posing a significant risk to applications leveraging ROS for robotic frameworks and automation.

Affected Version(s)

Robot Operating System (ROS) Linux Noetic Ninjemys

Robot Operating System (ROS) Linux Melodic Morenia

Robot Operating System (ROS) Linux Kinetic Kame

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Florencia Cabral Berenfus, Ubuntu Robotics Team
.
CVE-2024-39835 : Code Injection Vulnerability in Robot Operating System's Command-Line Tool