Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2024-23749
HistoryFeb 09, 2024 - 8:15 a.m.

CVE-2024-23749

2024-02-0908:15:08
Alpine Linux Development Team
security.alpinelinux.org
5
kitty
command injection
arbitrary code execution
insufficient input validation
special characters
insecure system calls
unix

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

24.0%

KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution.

OSVersionArchitecturePackageVersionFilename
Alpine3.19-communitynoarchkitty= 0.31.0-r4UNKNOWN
Alpine3.20-communitynoarchkitty= 0.31.0-r6UNKNOWN
Alpineedge-communitynoarchkitty= 0.31.0-r6UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

24.0%