CVE-2024-36360

OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
Configurations

No configuration.

History

14 Mar 2025, 15:15

Type Values Removed Values Added
CWE CWE-78

21 Nov 2024, 09:22

Type Values Removed Values Added
References () https://github.com/yammerjp/awkblog/issues/1 - () https://github.com/yammerjp/awkblog/issues/1 -
References () https://jvn.jp/en/jp/JVN80506242/ - () https://jvn.jp/en/jp/JVN80506242/ -

03 Jul 2024, 02:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

11 Jun 2024, 13:54

Type Values Removed Values Added
Summary
  • (es) La vulnerabilidad de inyección de comandos del sistema operativo existe en awkblog v0.0.1 (hash de commit: 7b761b192d0e0dc3eef0f30630e00ece01c8d552) y versiones anteriores. Si un atacante remoto no autenticado envía una solicitud HTTP especialmente manipulada, se puede ejecutar un comando arbitrario del sistema operativo con los privilegios del producto afectado en la máquina que ejecuta el producto.

11 Jun 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-11 05:15

Updated : 2025-03-14 15:15


NVD link : CVE-2024-36360

Mitre link : CVE-2024-36360

CVE.ORG link : CVE-2024-36360


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')