Lucene search

K
zdi@d0ntrashZDI-24-398
HistoryApr 25, 2024 - 12:00 a.m.

Wazuh Active Response Module Improper Input Validation Remote Code Execution Vulnerability

2024-04-2500:00:00
@d0ntrash
www.zerodayinitiative.com
4
wazuh
active response
input validation
remote code execution
vulnerability
authentication
ip address
json
root

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Wazuh. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of IP address arguments. The issue results from the lack of proper validation of JSON messages. An attacker can leverage this vulnerability to execute code in the context of root.

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

Related for ZDI-24-398