THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-36360

Assignerjpcert
Reserved2024-05-24
Published2024-06-11
Updated2024-06-11

Description

OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.

Problem types

OS command injection

Product status

v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier
affected

References

https://github.com/yammerjp/awkblog/issues/1

https://jvn.jp/en/jp/JVN80506242/

cve.org CVE-2024-36360

nvd.nist.gov CVE-2024-36360

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-36360
© Copyright 2024 THREATINT. Made in Cyprus with +