Description
exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
Published: 2024-09-18
Score: 8.6 High
EPSS: 26.5% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-723h-x37g-f8qm Chaosblade vulnerable to OS command execution
History

Wed, 18 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Chaosblade
Chaosblade chaosblade
Weaknesses CWE-78
CPEs cpe:2.3:a:chaosblade:chaosblade:*:*:*:*:*:*:*:*
Vendors & Products Chaosblade
Chaosblade chaosblade
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 17:00:00 +0000

Type Values Removed Values Added
Description exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
References

Subscriptions

Chaosblade Chaosblade
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-18T18:18:37.401Z

Reserved: 2023-10-30T00:00:00.000Z

Link: CVE-2023-47105

cve-icon Vulnrichment

Updated: 2024-09-18T18:08:12.656Z

cve-icon NVD

Status : Deferred

Published: 2024-09-18T17:15:18.277

Modified: 2026-04-15T00:35:42.020

Link: CVE-2023-47105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses