Skip to content

Details about the Blind RCE issue(SPX-GC) in SPX-GC

Notifications You must be signed in to change notification settings

merbinr/CVE-2024-44623

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 

Repository files navigation

CVE-2024-44623

In SPX-GC 1.3.0v and below versions, user-controlled input was passed in the exec function of the child_process module without any sanitization, leading to unauthenticated blind remote code execution.

Vulnerability

In /routes/routes-api.js, user input received from file param and passed into exec function of child_process leads to unauthenticated blind RCE

Blind RCE

Blind Remote Code Execution (RCE) in web applications occurs when an attacker can execute arbitrary code on a server without immediate feedback or direct knowledge of the results. This vulnerability often arises from improper user input handling and can be exploited through mechanisms like command execution. References:

Affected Product

SPX-GC <= 1.3.0v

Fixed Version

Fixed in 31c96893a193428a3a11499ed0e165125f9bbe23 commit, The changes were added to the master branch, so the new build and installation from that branch are not vulnerable. The fix has not yet been published as a release on GitHub.

CVE ID

CVE-2024-44623

Vulnerability Type

Blind Remote Code Execution

Root Cause

Usage of user input at require('child_process').exec('open "' + folder + '"'); function in the routes/routes-api.js file

Impact

Shell commands can be executed by an unauthenticated user in the instances where the vulnerable SPX-GC tool is running.

CVSS

9.8

References

Vulnerable Code: routes/routes-api.js#L37-L39

Fix Commit: 31c96893a193428a3a11499ed0e165125f9bbe23

About

Details about the Blind RCE issue(SPX-GC) in SPX-GC

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published