We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | CERT-PL |
Reserved | 2024-05-10 |
Published | 2024-06-24 |
Updated | 2024-10-10 |
The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server. The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Krzysztof Zając (CERT.PL)
https://cert.pl/en/posts/2024/06/CVE-2024-4748
https://cert.pl/posts/2024/06/CVE-2024-4748
https://github.com/jan-vandenberg/cruddiy/issues/67