An issue in tiagorlampert CHAOS v5.0.1 allows a remote attacker to execute arbitrary code via the BuildClient function within client_service.go
CPE | Name | Operator | Version |
---|---|---|---|
github.com/tiagorlampert/chaos | lt | 0.0.0-20220716132853-b47438d36e3a |
blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents
gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496
github.com/advisories/GHSA-p3j6-f45h-hw5f
github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b
github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e
github.com/tiagorlampert/CHAOS/pull/95
nvd.nist.gov/vuln/detail/CVE-2024-30850
nvd.nist.gov/vuln/detail/CVE-2024-33434