### [CVE-2023-22671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22671) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Ghidra/RuntimeScripts/Linux/support/launch.sh in NSA Ghidra through 10.2.2 passes user-provided input into eval, leading to command injection when calling analyzeHeadless with untrusted input. ### POC #### Reference - https://github.com/NationalSecurityAgency/ghidra/issues/4869 #### Github No PoCs found on GitHub currently.