Metrics
Affected Vendors & Products
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 12 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 12 Nov 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. A command injection vulnerability in the Web SSH feature allows an authenticated attacker to execute arbitrary commands as root on the host. Zoraxy has a Web SSH terminal feature that allows authenticated users to connect to SSH servers from their browsers. In HandleCreateProxySession the request to create an SSH session is handled. An attacker can exploit the username variable to escape from the bash command and inject arbitrary commands into sshCommand. This is possible, because, unlike hostname and port, the username is not validated or sanitized. | |
Title | Zoraxy has an authenticated command injection in the Web SSH feature | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-12T16:06:31.719Z
Updated: 2024-11-21T16:20:35.981Z
Reserved: 2024-11-04T17:46:16.779Z
Link: CVE-2024-52010
Updated: 2024-11-12T18:31:23.947Z
Status : Awaiting Analysis
Published: 2024-11-12T17:15:10.370
Modified: 2024-11-21T17:15:23.350
Link: CVE-2024-52010
No data.