An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the filename
argument into the buildStr
string without any sanitization or filtering.
CPE | Name | Operator | Version |
---|---|---|---|
github.com/tiagorlampert/chaos | lt | 0.0.0-20220716132853-b47438d36e3a |
gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496
github.com/tiagorlampert/CHAOS
github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b
github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e
github.com/tiagorlampert/CHAOS/commit/b47438d36e3ad746de8c009e644f6e5396703f25
github.com/tiagorlampert/CHAOS/pull/95
nvd.nist.gov/vuln/detail/CVE-2024-33434