The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.
The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2024/06/CVE-2024-4748 | Third Party Advisory |
https://cert.pl/posts/2024/06/CVE-2024-4748 | Third Party Advisory |
https://github.com/jan-vandenberg/cruddiy/issues/67 | Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERT-PL
Published: 2024-06-24T13:52:12.451Z
Updated: 2024-06-25T14:10:04.322Z
Reserved: 2024-05-10T11:25:24.322Z
Link: CVE-2024-4748
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-06-24T14:15:13.030
Modified: 2024-06-26T14:07:47.567
Link: CVE-2024-4748
JSON object: View
Redhat Information
No data.