An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the `filename` argument into the `buildStr` string without any sanitization or filtering.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xfjj-f699-rc79 tiagorlampert CHAOS vulnerable to arbitrary code execution
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T02:27:53.700Z

Reserved: 2024-04-23T00:00:00

Link: CVE-2024-33434

cve-icon Vulnrichment

Updated: 2024-05-07T20:06:06.690Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-07T14:15:10.760

Modified: 2024-11-21T09:16:57.263

Link: CVE-2024-33434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses