Project

General

Profile

Actions

Bug #1194

closed

OS command injection vulnerability in storescp --exec-on-reception

Added by Marco Eichelberg about 1 month ago. Updated 20 days ago.

Status:
Closed
Priority:
High
Category:
Application
Target version:
Start date:
2026-03-14
Due date:
% Done:

100%

Estimated time:
4:00 h
Module:
dcmnet
Operating System:
Compiler:

Description

Three placeholder tokens used in the shell command execution feature (#f , #p , #r) are derived from attacker-controlled input with insufficient or no sanitization. An unauthenticated attacker can achieve remote code execution by sending a single crafted DICOM C-STORE request to a storescp instance configured with --exec-on-reception.

The vulnerability exists because shell metacharacters in attacker-controlled DICOM fields are not sanitized before being passed to /bin/sh -c . The DCMTK team partially addressed this class of issue in February 2024 (DCMTK issue #1109) by adding allowlist sanitization for AE title placeholders (#a , #c), but the same fix was not applied to the filename (#f), path (#p), or reverse DNS (#r) placeholders.

Reported 2026-02-21 by Machine Spirits UG (haftungsbeschränkt),

Actions

Also available in: Atom PDF