[Japanese]

JVNDB-2024-000056

awkblog vulnerable to OS command injection

Overview

awkblog provided by Keisuke Nakayama contains an OS command injection vulnerability (CWE-78).

Keigo YAMAZAKI of LAC Co., Ltd. / Nuligen Security Co., Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 9.8 (Critical) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products


Keisuke Nakayama
  • awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier

Impact

If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
Solution

[Apply the Patch]
Apply the patch according to the information provided by the developer.
The developer has released the following patch to address this vulnerability.


  • awkblog v0.0.2 (commit hash:13f62021258f7256f1567c4bb5fa6bddcfccde72)
Vendor Information

Keisuke Nakayama
CWE (What is CWE?)

  1. OS Command Injection(CWE-78) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2024-36360
References

  1. JVN : JVN#80506242
Revision History

  • [2024/05/30]
      Web page was published