CVE-2023-43364 – searchor
Package
Manager: pip
Name: searchor
Vulnerable Version: >=0 <2.4.2
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.29638 pctl0.96472
Details
Searchor CLI's Search vulnerable to Arbitrary Code using Eval An issue in Arjun Sharda's Searchor before version v.2.4.2 allows an attacker to execute arbitrary code via a crafted script to the eval() function in Searchor's src/searchor/main.py file, affecting the search feature in Searchor's CLI (Command Line Interface). ### Impact Versions equal to, or below 2.4.1 are affected. ### Patches Versions above, or equal to 2.4.2 have patched the vulnerability. ### References https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit- https://github.com/jonnyzar/POC-Searchor-2.4.2 https://github.com/ArjunSharda/Searchor/pull/130
Metadata
Created: 2023-09-25T18:37:51Z
Modified: 2024-10-09T22:52:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-66m2-493m-crh2/GHSA-66m2-493m-crh2.json
CWE IDs: ["CWE-74", "CWE-94"]
Alternative ID: GHSA-66m2-493m-crh2
Finding: F184
Auto approve: 1