Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-28627
HistoryMar 27, 2023 - 8:13 p.m.

CVE-2023-28627 OS Command Injection via GIT_PATH in pymedusa

2023-03-2720:13:02
CWE-78
GitHub_M
www.cve.org
pymedusa
os command injection
vulnerability
cve-2023-28627
web interface
arbitrary commands
upgrade

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.1%

pymedusa is an automatic video library manager for TV Shows. In versions prior 1.0.12 an attacker with access to the web interface can update the git executable path in /config/general/ > advanced settings with arbitrary OS commands. An attacker may exploit this vulnerability to take execute arbitrary OS commands as the user running the pymedusa program. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "pymedusa",
    "product": "Medusa",
    "versions": [
      {
        "version": "< 1.0.12",
        "status": "affected"
      }
    ]
  }
]

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

9.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.1%

Related for CVELIST:CVE-2023-28627