CVE-2024-38366

Scores

EPSS

0.585medium58.5%
0%20%40%60%80%100%

Percentile: 58.5%

CVSS

10.0critical3.x
0246810

CVSS Score: 10.0/10

All CVSS Scores

CVSS 3.x
10.0

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Description

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This issue was patched server-side with commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 in September 2023. This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-74

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-38366

Source: github-poc

URL: https://github.com/ReeFSpeK/CocoaPods-RCE_CVE-2024-38366

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: trunk.cocoapods.org

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:cocoapods:trunk.cocoapods.org:*:*:*:*:ruby:*:*:*",      "versionEndExcluding": "2023-09-22",      "vulnerable": true    }  ],  "operator": "O...

Source: nvd

End of list