KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2024/Feb/13 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Feb/14 | Exploit Mailing List Third Party Advisory |
https://blog.defcesco.io/CVE-2024-23749 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2024/Feb/13 | Exploit Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2024/Feb/14 | Exploit Mailing List Third Party Advisory |
https://blog.defcesco.io/CVE-2024-23749 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory | |
References | () https://blog.defcesco.io/CVE-2024-23749 - Exploit, Third Party Advisory |
14 Feb 2024, 13:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
9bis
9bis kitty |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-77 | |
CPE | cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:* | |
References | () https://blog.defcesco.io/CVE-2024-23749 - Exploit, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Feb/14 - Exploit, Mailing List, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2024/Feb/13 - Exploit, Mailing List, Third Party Advisory |
14 Feb 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Feb 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-09 08:15
Updated : 2024-11-21 08:58
NVD link : CVE-2024-23749
Mitre link : CVE-2024-23749
CVE.ORG link : CVE-2024-23749
JSON object : View
Products Affected
9bis
- kitty
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')