CVE-2023-47105 – github.com/chaosblade-io/chaosblade
Package
Manager: go
Name: github.com/chaosblade-io/chaosblade
Vulnerable Version: >=0.0.3 <1.7.4
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.14865 pctl0.94286
Details
Chaosblade vulnerable to OS command execution exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
Metadata
Created: 2024-09-18T18:30:51Z
Modified: 2024-09-25T19:28:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-723h-x37g-f8qm/GHSA-723h-x37g-f8qm.json
CWE IDs: ["CWE-78", "CWE-95"]
Alternative ID: GHSA-723h-x37g-f8qm
Finding: F004
Auto approve: 1