An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the `filename` argument into the `buildStr` string without any sanitization or filtering.
References
Configurations
No configuration.
History
21 Nov 2024, 09:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496 - | |
References | () https://github.com/tiagorlampert/CHAOS/pull/95 - |
03 Jul 2024, 01:58
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
07 May 2024, 20:07
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 May 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-07 14:15
Updated : 2024-11-21 09:16
NVD link : CVE-2024-33434
Mitre link : CVE-2024-33434
CVE.ORG link : CVE-2024-33434
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')