Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Claude HUD 0.0.12 Terminal Injection via OSC 8 Hyperlinks
Vulnerability Description
Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Vulnerability Type
转义、元或控制序列转义处理不恰当
Vulnerability Title
Claude HUD 安全漏洞
Vulnerability Description
Claude HUD是Jarrod Watts个人开发者的一个显示上下文使用、工具状态和进度的Claude Code插件。 Claude HUD 0.0.12及之前版本存在安全漏洞,该漏洞源于使用原始cwd和branchUrl值构建OSC 8终端超链接转义序列时未剥离控制字符或编码嵌入值,可能导致攻击者将任意ANSI代码注入终端会话。攻击者可以在当前工作目录或分支URL中嵌入ESC+反斜杠序列,执行恶意ANSI代码包括文本颜色更改、伪造提示和OSC 52剪贴板写入,或触发指向攻击者控制远程的出站HTTP请
CVSS Information
N/A
Vulnerability Type
N/A