CVE-2024-42360

SequenceServer lets you rapidly set up a BLAST+ server with an intuitive user interface for personal or group use. Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands. This vulnerability has been fixed in 3.1.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wurmlab:sequenceserver:*:*:*:*:*:ruby:*:*

History

16 Aug 2024, 20:00

Type Values Removed Values Added
Summary
  • (es) SequenceServer le permite configurar rápidamente un servidor BLAST+ con una interfaz de usuario intuitiva para uso personal o grupal. Varios endpoints HTTP no desinfectaron adecuadamente la entrada del usuario y/o los parámetros de consulta. Esto podría aprovecharse para inyectar y ejecutar comandos de shell no deseados. Esta vulnerabilidad se ha solucionado en 3.1.2.
CPE cpe:2.3:a:wurmlab:sequenceserver:*:*:*:*:*:ruby:*:*
References () https://github.com/wurmlab/sequenceserver/commit/457e52709f7f9ed2fceed59b3db564cb50785dba - () https://github.com/wurmlab/sequenceserver/commit/457e52709f7f9ed2fceed59b3db564cb50785dba - Patch
References () https://github.com/wurmlab/sequenceserver/security/advisories/GHSA-qv32-5wm2-p32h - () https://github.com/wurmlab/sequenceserver/security/advisories/GHSA-qv32-5wm2-p32h - Vendor Advisory
First Time Wurmlab sequenceserver
Wurmlab

14 Aug 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-14 20:15

Updated : 2024-08-16 20:00


NVD link : CVE-2024-42360

Mitre link : CVE-2024-42360

CVE.ORG link : CVE-2024-42360


JSON object : View

Products Affected

wurmlab

  • sequenceserver
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')