Lucene search

K
cvelistOpenEulerCVELIST:CVE-2024-24897
HistoryMar 25, 2024 - 7:10 a.m.

CVE-2024-24897 Remote command execution in A-Tune-Collector

2024-03-2507:10:48
CWE-77
openEuler
www.cve.org
cve-2024-24897
remote command execution
a-tune-collector
linux
command injection
openeuler
vulnerability
program files
gitee
version 1.1.0-3
version 1.3.0

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability in openEuler A-Tune-Collector on Linux allows Command Injection. This vulnerability is associated with program files https://gitee.Com/openeuler/A-Tune-Collector/blob/master/atune_collector/plugin/monitor/process/sched.Py.

This issue affects A-Tune-Collector: from 1.1.0-3 through 1.3.0.

CNA Affected

[
  {
    "collectionURL": "https://gitee.com/openeuler",
    "defaultStatus": "unaffected",
    "packageName": "A-Tune-Collector",
    "platforms": [
      "Linux"
    ],
    "product": "A-Tune-Collector",
    "programFiles": [
      "https://gitee.com/openeuler/A-Tune-Collector/blob/master/atune_collector/plugin/monitor/process/sched.py"
    ],
    "repo": "https://gitee.com/openeuler/A-Tune-Collector",
    "vendor": "openEuler",
    "versions": [
      {
        "changes": [
          {
            "at": "https://gitee.com/src-openeuler/A-Tune-Collector/commit/b457eb50cb7528a16a82812562f7627ec6712cf6",
            "status": "unaffected"
          },
          {
            "at": "https://gitee.com/src-openeuler/A-Tune-Collector/commit/588032f3067f01aef49ee2583888370cae015517",
            "status": "unaffected"
          },
          {
            "at": "https://gitee.com/src-openeuler/A-Tune-Collector/commit/d6923f8d15ba17b3c517dff289c12480023909ea",
            "status": "unaffected"
          },
          {
            "at": "https://gitee.com/src-openeuler/A-Tune-Collector/commit/9b4b6990517d5427a8b48a1beb4dfc233ff91a14",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "1.3.0",
        "status": "affected",
        "version": "1.1.0-3",
        "versionType": "git"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

Related for CVELIST:CVE-2024-24897