CVE-2024-36138

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Configurations

No configuration.

History

21 Nov 2024, 09:21

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241108-0010/ -

09 Sep 2024, 18:35

Type Values Removed Values Added
CWE CWE-77

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Se omite la corrección incompleta de CVE-2024-27980, que surge del manejo inadecuado de archivos por lotes con todas las extensiones posibles en Windows a través de child_process.spawn / child_process.spawnSync. Un argumento de línea de comandos malintencionado puede inyectar comandos arbitrarios y lograr la ejecución del código incluso si la opción de shell no está habilitada.

07 Sep 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-07 16:15

Updated : 2024-11-21 09:21


NVD link : CVE-2024-36138

Mitre link : CVE-2024-36138

CVE.ORG link : CVE-2024-36138


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')