Lucene search

K
githubGitHub Advisory DatabaseGHSA-738Q-MC72-2Q22
HistoryOct 10, 2023 - 9:31 p.m.

MTProto proxy remote code execution vulnerability

2023-10-1021:31:12
CWE-94
CWE-1188
GitHub Advisory Database
github.com
20
mtproto proxy
remote code execution
vulnerability
erlang
remote attacker
command execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

38.0%

In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.

Affected configurations

Vulners
Node
mtprotomt_proto_proxyRange0.7.2erlang
VendorProductVersionCPE
mtprotomt_proto_proxy*cpe:2.3:a:mtproto:mt_proto_proxy:*:*:*:*:*:erlang:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

38.0%

Related for GHSA-738Q-MC72-2Q22