OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
References
Configurations
No configuration.
History
14 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yammerjp/awkblog/issues/1 - | |
References | () https://jvn.jp/en/jp/JVN80506242/ - |
03 Jul 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
11 Jun 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-11 05:15
Updated : 2025-03-14 15:15
NVD link : CVE-2024-36360
Mitre link : CVE-2024-36360
CVE.ORG link : CVE-2024-36360
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')