Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-41111
HistoryJul 18, 2024 - 10:11 p.m.

CVE-2024-41111 BishopFox Sliver Authenticated Remote Code Execution

2024-07-1822:11:44
CWE-74
GitHub_M
github.com
bishopfox sliver
authenticated
remote code execution
vulnerability
low-privileged user
security boundary
server
exploit
console logs
file modification
server deletion
version 1.6.0
pre-release

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver version 1.6.0 (prerelease) is vulnerable to RCE on the teamserver by a low-privileged “operator” user. The RCE is as the system root user. The exploit is pretty fun as we make the Sliver server pwn itself. As described in a past issue (#65), “there is a clear security boundary between the operator and server, an operator should not inherently be able to run commands or code on the server.” An operator who exploited this vulnerability would be able to view all console logs, kick all other operators, view and modify files stored on the server, and ultimately delete the server. This issue has not yet be addressed but is expected to be resolved before the full release of version 1.6.0. Users of the 1.6.0 prerelease should avoid using Silver in production.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:bishopfox:sliver:1.6.0-dev:*:*:*:*:*:*:*"
    ],
    "vendor": "bishopfox",
    "product": "sliver",
    "versions": [
      {
        "status": "affected",
        "version": "1.6.0-dev"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-41111