Lucene search

K
cve[email protected]CVE-2024-4748
HistoryJun 24, 2024 - 2:15 p.m.

CVE-2024-4748

2024-06-2414:15:13
CWE-77
CWE-78
web.nvd.nist.gov
22
cruddiy
shell command injection
post request
local launch

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.0%

The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server. 
The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.

Affected configurations

NVD
Node
j11gcruddiyRange202312.1
CPENameOperatorVersion
j11g:cruddiyj11g cruddiyle202312.1

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "CRUDDIY",
    "repo": "https://github.com/jan-vandenberg/cruddiy",
    "vendor": "CRUDDIY",
    "versions": [
      {
        "lessThanOrEqual": "202312.1",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.0%

Related for CVE-2024-4748