We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-37469

CasaOS Command Injection vulnerability



Description

CasaOS is an open-source personal cloud system. Prior to version 0.4.4, if an authenticated user using CasaOS is able to successfully connect to a controlled SMB server, they are able to execute arbitrary commands. Version 0.4.4 contains a patch for the issue.

Reserved 2023-07-06 | Published 2023-08-24 | Updated 2024-10-02 | Assigner GitHub_M


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< 0.4.4
affected

References

securitylab.github.com/advisories/GHSL-2022-119_CasaOS/

github.com/...ommit/af440eac5563644854ff33f72041e52d3fd1f47c

github.com/...30098c771bc41fd3baf46189b859/route/v1/samba.go

github.com/...c771bc41fd3baf46189b859/service/connections.go

github.com/IceWhaleTech/CasaOS/releases/tag/v0.4.4

cve.org (CVE-2023-37469)

nvd.nist.gov (CVE-2023-37469)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-37469

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.