{"id":"CVE-2018-3836","details":"An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.","modified":"2026-04-16T06:17:14.841873753Z","published":"2018-04-24T19:29:03.970Z","related":["openSUSE-SU-2024:10914-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/02/msg00019.html"},{"type":"EVIDENCE","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/danbloomberg/leptonica","events":[{"introduced":"0"},{"last_affected":"f3d7ee868b4864cdca7ea57349d49f3d2b4a63ec"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.74.4"}]}}],"versions":["1.74.0","1.74.1","1.74.2","1.74.3","1.74.4","v1.42","v1.44","v1.46","v1.48","v1.50","v1.52","v1.54","v1.56","v1.58","v1.60","v1.61","v1.62","v1.63","v1.64","v1.65","v1.66","v1.67","v1.68","v1.69","v1.70","v1.71","v1.72","v1.73","v1.74.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-3836.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}