CVE-2024-38366

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This issue was patched server-side with commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 in September 2023. This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cocoapods:trunk.cocoapods.org:*:*:*:*:ruby:*:*:*

History

18 Sep 2024, 15:06

Type Values Removed Values Added
References () https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 - () https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 - Vendor Advisory
References () https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#2-remote-code-execution-on-the-cocoapods-trunk-server - () https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#2-remote-code-execution-on-the-cocoapods-trunk-server - Exploit, Third Party Advisory
References () https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-x2x4-g675-qg7c - () https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-x2x4-g675-qg7c - Third Party Advisory
First Time Cocoapods
Cocoapods trunk.cocoapods.org
CPE cpe:2.3:a:cocoapods:trunk.cocoapods.org:*:*:*:*:ruby:*:*:*

02 Jul 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.0
v2 : unknown
v3 : 10.0

02 Jul 2024, 12:09

Type Values Removed Values Added
Summary
  • (es) trunk.cocoapods.org es el servidor de autenticación para el administrador de dependencias de CoacoaPods. La parte del tronco que verifica si un usuario tiene una dirección de correo electrónico real al registrarse utilizó una librería rfc-822 que ejecuta un comando de shell para validar la validez de los registros MX del dominio de correo electrónico. Funciona a través de un DNS MX. Esta búsqueda podría manipularse para ejecutar también un comando en el servidor troncal, otorgando efectivamente acceso raíz al servidor y a la infraestructura. Este problema se solucionó en el lado del servidor con el commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 en septiembre de 2023. Este RCE desencadenó un restablecimiento completo de la sesión del usuario, ya que un atacante podría haber usado este método para escribir en cualquier Podspec en el tronco.

01 Jul 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-01 21:15

Updated : 2024-09-18 15:22


NVD link : CVE-2024-38366

Mitre link : CVE-2024-38366

CVE.ORG link : CVE-2024-38366


JSON object : View

Products Affected

cocoapods

  • trunk.cocoapods.org
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')