CVE-2024-23749

KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
References
Link Resource
http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2024/Feb/13 Exploit Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Feb/14 Exploit Mailing List Third Party Advisory
https://blog.defcesco.io/CVE-2024-23749 Exploit Third Party Advisory
http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2024/Feb/13 Exploit Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Feb/14 Exploit Mailing List Third Party Advisory
https://blog.defcesco.io/CVE-2024-23749 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 08:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory
References () https://blog.defcesco.io/CVE-2024-23749 - Exploit, Third Party Advisory () https://blog.defcesco.io/CVE-2024-23749 - Exploit, Third Party Advisory

14 Feb 2024, 13:59

Type Values Removed Values Added
First Time 9bis
9bis kitty
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-77
CPE cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*
References () https://blog.defcesco.io/CVE-2024-23749 - () https://blog.defcesco.io/CVE-2024-23749 - Exploit, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Feb/14 - () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2024/Feb/13 - () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory

14 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Feb/14 -
  • () http://seclists.org/fulldisclosure/2024/Feb/13 -

09 Feb 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 08:15

Updated : 2024-11-21 08:58


NVD link : CVE-2024-23749

Mitre link : CVE-2024-23749

CVE.ORG link : CVE-2024-23749


JSON object : View

Products Affected

9bis

  • kitty
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')