An OS command injection vulnerability exists in the name parameter of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Dec 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Mayuresh82
Mayuresh82 gocast
CPEs cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*
Vendors & Products Mayuresh82
Mayuresh82 gocast

Fri, 22 Nov 2024 12:00:00 +0000


Thu, 21 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Gocast
Gocast gocast
CPEs cpe:2.3:a:gocast:gocast:*:*:*:*:*:*:*:*
Vendors & Products Gocast
Gocast gocast
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 21 Nov 2024 14:45:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in the name parameter of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-11-21T16:03:31.096Z

Reserved: 2024-03-22T18:56:37.392Z

Link: CVE-2024-28892

cve-icon Vulnrichment

Updated: 2024-11-21T16:03:31.096Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-21T15:15:29.007

Modified: 2024-12-20T17:05:48.707

Link: CVE-2024-28892

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.