OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36029 OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 14 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Keisuke Nakayama
Keisuke Nakayama awkblog
Weaknesses CWE-78
CPEs cpe:2.3:a:keisuke_nakayama:awkblog:*:*:*:*:*:*:*:*
Vendors & Products Keisuke Nakayama
Keisuke Nakayama awkblog
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-03-14T14:43:00.422Z

Reserved: 2024-05-24T02:04:55.207Z

Link: CVE-2024-36360

cve-icon Vulnrichment

Updated: 2024-08-02T03:37:04.935Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-11T05:15:53.610

Modified: 2025-03-14T15:15:41.037

Link: CVE-2024-36360

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses