CVE-2024-50603

Scores

EPSS

0.944high94.4%
0%20%40%60%80%100%

Percentile: 94.4%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

78CWE-78

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-50603

Source: github-poc

URL: https://github.com/th3gokul/CVE-2024-50603

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: controller

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:*",      "versionEndExcluding": "7.1.4191",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:...

Source: nvd

End of list