CVE-2024-52010
CVSS V2 None
CVSS V3 None
Description
Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. A command injection vulnerability in the Web SSH feature allows an authenticated attacker to execute arbitrary commands as root on the host. Zoraxy has a Web SSH terminal feature that allows authenticated users to connect to SSH servers from their browsers. In HandleCreateProxySession the request to create an SSH session is handled. An attacker can exploit the username variable to escape from the bash command and inject arbitrary commands into sshCommand. This is possible, because, unlike hostname and port, the username is not validated or sanitized.
Overview
- CVE ID
- CVE-2024-52010
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-12T16:06:31.719Z
- Last Modified Date
- 2024-11-12T18:33:07.311Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/tobychui/zoraxy/security/advisories/GHSA-7hpf-g48v-hw3j | x_refsource_CONFIRM |
https://github.com/tobychui/zoraxy/commit/2e9bc77a5d832bff1093058d42ce7a61382e4bc6 | x_refsource_MISC |
https://github.com/tobychui/zoraxy/commit/c07d5f85dfc37bd32819358ed7d4bc32c604e8f0 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-52010 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52010 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-13 13:47:18 | Added to TrackCVE |