CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").
CVE-2013-10051 (GCVE-0-2013-10051)
Vulnerability from cvelistv5
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Vendor | Product | Version | ||
---|---|---|---|---|
InstantCMS | InstantCMS |
Version: * ≤ 1.6 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2013-10051", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-05T14:45:34.300173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-05T14:46:57.784Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/26622" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "search view handler" ], "product": "InstantCMS", "vendor": "InstantCMS", "versions": [ { "lessThanOrEqual": "1.6", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Ricardo Jorge Borges de Almeida" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of \u003ccode\u003eeval()\u003c/code\u003e within the \u003ccode\u003esearch\u003c/code\u003e view handler. Specifically, user-supplied input passed via the \u003ccode\u003elook\u003c/code\u003e parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the \u003ccode\u003eCmd\u003c/code\u003e header, resulting in arbitrary PHP code execution within the context of the web server.\u003c/p\u003e\u003cdiv\u003e\u003c/div\u003e\u003cbr\u003e" } ], "value": "A remote PHP code execution vulnerability exists in InstantCMS version 1.6 and earlier due to unsafe use of eval() within the search view handler. Specifically, user-supplied input passed via the look parameter is concatenated into a PHP expression and executed without proper sanitation. A remote attacker can exploit this flaw by sending a crafted HTTP GET request with a base64-encoded payload in the Cmd header, resulting in arbitrary PHP code execution within the context of the web server." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] }, { "capecId": "CAPEC-137", "descriptions": [ { "lang": "en", "value": "CAPEC-137 Parameter Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T20:41:38.540Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/instantcms_exec.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/26622" }, { "tags": [ "exploit" ], "url": "https://packetstorm.news/files/id/122176" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/instantcms-remote-php-code-execution" } ], "source": { "discovery": "UNKNOWN" }, "title": "InstantCMS \u003c= 1.6 Remote PHP Code Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2013-10051", "datePublished": "2025-08-01T20:41:38.540Z", "dateReserved": "2025-08-01T15:08:19.335Z", "dateUpdated": "2025-08-05T14:46:57.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-10070 (GCVE-0-2013-10070)
Vulnerability from cvelistv5
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Vendor | Product | Version | ||
---|---|---|---|---|
PHP-Charts | PHP-Charts |
Version: 1.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2013-10070", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-07T15:16:13.951367Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-07T15:16:16.947Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/php_charts_exec.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/24201" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/24273" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "wizard/url.php" ], "product": "PHP-Charts", "vendor": "PHP-Charts", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "AkaStep" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "PHP-Charts v1.0 contains a PHP code execution vulnerability in wizard/url.php, where user-supplied GET parameter names are passed directly to eval() without sanitization. A remote attacker can exploit this flaw by crafting a request that injects arbitrary PHP code, resulting in command execution under the web server\u0027s context. The vulnerability allows unauthenticated attackers to execute system-level commands via base64-encoded payloads embedded in parameter names, leading to full compromise of the host system." } ], "value": "PHP-Charts v1.0 contains a PHP code execution vulnerability in wizard/url.php, where user-supplied GET parameter names are passed directly to eval() without sanitization. A remote attacker can exploit this flaw by crafting a request that injects arbitrary PHP code, resulting in command execution under the web server\u0027s context. The vulnerability allows unauthenticated attackers to execute system-level commands via base64-encoded payloads embedded in parameter names, leading to full compromise of the host system." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 10, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-05T20:04:44.526Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/php_charts_exec.rb" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/24201" }, { "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/24273" }, { "tags": [ "product" ], "url": "https://web.archive.org/web/20130120234844/http://php-charts.com/" }, { "tags": [ "third-party-advisory" ], "url": "https://www.vulncheck.com/advisories/php-charts-php-code-execution" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "unsupported-when-assigned" ], "title": "PHP-Charts v1.0 PHP Code Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2013-10070", "datePublished": "2025-08-05T20:04:44.526Z", "dateReserved": "2025-08-05T15:32:22.299Z", "dateUpdated": "2025-08-07T15:16:16.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-7101 (GCVE-0-2023-7101)
Vulnerability from cvelistv5
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Vendor | Product | Version | ||
---|---|---|---|---|
Douglas Wilson | Spreadsheet::ParseExcel |
Version: 0.65 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jmcnamara:spreadsheet\\:\\:parseexcel:0.41:*:*:*:*:perl:*:*" ], "defaultStatus": "unknown", "product": "spreadsheet\\", "vendor": "jmcnamara", "versions": [ { "lessThanOrEqual": "0.65", "status": "affected", "version": "0.41", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "debian_linux", "vendor": "debian", "versions": [ { "status": "affected", "version": "10" } ] }, { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "status": "affected", "version": "38" }, { "status": "affected", "version": "39" } ] }, { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "status": "affected", "version": "38" }, { "status": "affected", "version": "39" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-7101", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-19T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-01-02", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-7101" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-08-20T03:56:13.214Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-01-02T00:00:00+00:00", "value": "CVE-2023-7101 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:50:08.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md" }, { "tags": [ "x_transferred" ], "url": "https://https://www.cve.org/CVERecord?id=CVE-2023-7101" }, { "tags": [ "x_transferred" ], "url": "https://https://metacpan.org/dist/Spreadsheet-ParseExcel" }, { "tags": [ "x_transferred" ], "url": "https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/29/4" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html" }, { "tags": [ "x_transferred" ], "url": "https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/" }, { "tags": [ "x_transferred" ], "url": "https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://metacpan.org/pod/Spreadsheet::ParseExcel", "defaultStatus": "affected", "packageName": "Spreadsheet::ParseExcel", "product": "Spreadsheet::ParseExcel", "repo": "https://metacpan.org/release/DOUGW/Spreadsheet-ParseExcel-0.65/source/lib/Spreadsheet", "vendor": "Douglas Wilson", "versions": [ { "status": "affected", "version": "0.65" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Le Dinh Hai (https://github.com/haile01/perl_spreadsheet_excel_rce_poc/tree/main)" }, { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Barracuda Networks Inc. https://www.barracuda.com/" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eSpreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary\u003c/span\u003e \u003cspan style=\"background-color: transparent;\"\u003ecode execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type \u201ceval\u201d. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic. \u003c/span\u003e\u003cbr\u003e" } ], "value": "Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type \u201ceval\u201d. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic." } ], "impacts": [ { "capecId": "CAPEC-137", "descriptions": [ { "lang": "en", "value": "CAPEC-137: Parameter Injection" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-05T14:52:28.089Z", "orgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484", "shortName": "Mandiant" }, "references": [ { "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md" }, { "url": "https://https://www.cve.org/CVERecord?id=CVE-2023-7101" }, { "url": "https://https://metacpan.org/dist/Spreadsheet-ParseExcel" }, { "url": "https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc" }, { "url": "https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171" }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/29/4" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html" }, { "url": "https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/" }, { "url": "https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to version 0.66\u003cbr\u003e" } ], "value": "Update to version 0.66" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary Code Execution (ACE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484", "assignerShortName": "Mandiant", "cveId": "CVE-2023-7101", "datePublished": "2023-12-24T21:34:46.527Z", "dateReserved": "2023-12-24T16:23:02.000Z", "dateUpdated": "2025-08-20T03:56:13.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31982 (GCVE-0-2024-31982)
Vulnerability from cvelistv5
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Vendor | Product | Version | ||
---|---|---|---|---|
xwiki | xwiki-platform |
Version: >= 2.4-milestone-1, < 14.10.20 Version: >= 15.0-rc-1, < 15.5.4 Version: >= 15.6-rc-1, < 15.10-rc-1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-09-25T16:39:01.533Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.vicarius.io/vsociety/posts/cve-2024-31982-detect-xwiki-vulnerability" }, { "url": "https://www.vicarius.io/vsociety/posts/cve-2024-31982-xwiki-mitigation-vulnerability" }, { "name": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/3c9e4bb04286de94ad24854026a09fa967538e31", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xwiki/xwiki-platform/commit/3c9e4bb04286de94ad24854026a09fa967538e31" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/459e968be8740c8abc2a168196ce21e5ba93cfb8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xwiki/xwiki-platform/commit/459e968be8740c8abc2a168196ce21e5ba93cfb8" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/95bdd6cc6298acdf7f8f21298d40eeb8390a8565", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xwiki/xwiki-platform/commit/95bdd6cc6298acdf7f8f21298d40eeb8390a8565" }, { "name": "https://jira.xwiki.org/browse/XWIKI-21472", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.xwiki.org/browse/XWIKI-21472" }, { "tags": [ "x_transferred" ], "url": "https://www.vicarius.io/vsociety/posts/xwiki-rce-cve-2024-31982" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } }, { "affected": [ { "cpes": [ "cpe:2.3:a:xwiki:xwiki-platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xwiki-platform", "vendor": "xwiki", "versions": [ { "lessThan": "14.10.20", "status": "affected", "version": "2.4-milestone-1", "versionType": "custom" }, { "lessThan": "15.5.4", "status": "affected", "version": "15.0-rc-1", "versionType": "custom" }, { "lessThan": "15.10-rc-1", "status": "affected", "version": "15.6-rc-1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31982", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-20T19:00:50.608451Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T19:02:45.798Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "xwiki-platform", "vendor": "xwiki", "versions": [ { "status": "affected", "version": "\u003e= 2.4-milestone-1, \u003c 14.10.20" }, { "status": "affected", "version": "\u003e= 15.0-rc-1, \u003c 15.5.4" }, { "status": "affected", "version": "\u003e= 15.6-rc-1, \u003c 15.10-rc-1" } ] } ], "descriptions": [ { "lang": "en", "value": "XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki\u0027s database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T18:57:47.669Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/3c9e4bb04286de94ad24854026a09fa967538e31", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xwiki/xwiki-platform/commit/3c9e4bb04286de94ad24854026a09fa967538e31" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/459e968be8740c8abc2a168196ce21e5ba93cfb8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xwiki/xwiki-platform/commit/459e968be8740c8abc2a168196ce21e5ba93cfb8" }, { "name": "https://github.com/xwiki/xwiki-platform/commit/95bdd6cc6298acdf7f8f21298d40eeb8390a8565", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xwiki/xwiki-platform/commit/95bdd6cc6298acdf7f8f21298d40eeb8390a8565" }, { "name": "https://jira.xwiki.org/browse/XWIKI-21472", "tags": [ "x_refsource_MISC" ], "url": "https://jira.xwiki.org/browse/XWIKI-21472" }, { "url": "https://www.vicarius.io/vsociety/posts/xwiki-rce-cve-2024-31982" } ], "source": { "advisory": "GHSA-2858-8cfx-69m9", "discovery": "UNKNOWN" }, "title": "XWiki Platform: Remote code execution as guest via DatabaseSearch" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-31982", "datePublished": "2024-04-10T19:38:01.879Z", "dateReserved": "2024-04-08T13:48:37.490Z", "dateUpdated": "2025-09-25T16:39:01.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36401 (GCVE-0-2024-36401)
Vulnerability from cvelistv5
- CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
▼ | URL | Tags |
---|---|---|
https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv | x_refsource_CONFIRM | |
https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w | x_refsource_MISC | |
https://github.com/geotools/geotools/pull/4797 | x_refsource_MISC | |
https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852 | x_refsource_MISC | |
https://osgeo-org.atlassian.net/browse/GEOT-7587 | x_refsource_MISC |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:geoserver:geoserver:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "geoserver", "vendor": "geoserver", "versions": [ { "lessThan": "2.23.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:geoserver:geoserver:2.24.0:-:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "geoserver", "vendor": "geoserver", "versions": [ { "lessThan": "2.24.4", "status": "affected", "version": "2.24.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:geoserver:geoserver:2.25.0:-:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "geoserver", "vendor": "geoserver", "versions": [ { "lessThan": "2.25.2", "status": "affected", "version": "2.25.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36401", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-13T03:55:17.574252Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-07-15", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-36401" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:00.179Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-07-15T00:00:00+00:00", "value": "CVE-2024-36401 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-19T07:47:49.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv" }, { "name": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w" }, { "name": "https://github.com/geotools/geotools/pull/4797", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/geotools/geotools/pull/4797" }, { "name": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852" }, { "name": "https://osgeo-org.atlassian.net/browse/GEOT-7587", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://osgeo-org.atlassian.net/browse/GEOT-7587" }, { "url": "https://www.vicarius.io/vsociety/posts/geoserver-rce-cve-2024-36401" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "geoserver", "vendor": "geoserver", "versions": [ { "status": "affected", "version": "\u003e= 2.23.0, \u003c 2.23.6" }, { "status": "affected", "version": "\u003e= 2.24.0, \u003c 2.24.4" }, { "status": "affected", "version": "\u003e= 2.25.0, \u003c 2.25.2" }, { "status": "affected", "version": "\u003c 2.22.6" } ] } ], "descriptions": [ { "lang": "en", "value": "GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-19T14:55:46.536Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/geoserver/geoserver/security/advisories/GHSA-6jj6-gm7p-fcvv" }, { "name": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w" }, { "name": "https://github.com/geotools/geotools/pull/4797", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/geotools/geotools/pull/4797" }, { "name": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Warxim/CVE-2022-41852?tab=readme-ov-file#workaround-for-cve-2022-41852" }, { "name": "https://osgeo-org.atlassian.net/browse/GEOT-7587", "tags": [ "x_refsource_MISC" ], "url": "https://osgeo-org.atlassian.net/browse/GEOT-7587" } ], "source": { "advisory": "GHSA-6jj6-gm7p-fcvv", "discovery": "UNKNOWN" }, "title": "Remote Code Execution (RCE) vulnerability in evaluating property name expressions in Geoserver" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-36401", "datePublished": "2024-07-01T15:25:41.873Z", "dateReserved": "2024-05-27T15:59:57.030Z", "dateUpdated": "2025-07-30T01:37:00.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39289 (GCVE-0-2024-39289)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39289", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:35:48.704499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:35:59.863Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rosparam" ], "packageName": "rosparam", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code execution vulnerability has been discovered in the Robot Operating System (ROS) \u0027rosparam\u0027 tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code." } ], "value": "A code execution vulnerability has been discovered in the Robot Operating System (ROS) \u0027rosparam\u0027 tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability stems from the use of the eval() function to process unsanitized, user-supplied parameter values via special converters for angle representations in radians. This flaw allowed attackers to craft and execute arbitrary Python code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:04:04.631Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rosparam tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-39289", "datePublished": "2025-07-17T19:11:07.080Z", "dateReserved": "2024-08-01T12:00:12.191Z", "dateUpdated": "2025-07-18T08:04:04.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39835 (GCVE-0-2024-39835)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39835", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:36:20.278839Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:36:29.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "roslaunch" ], "packageName": "roslaunch", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code injection vulnerability has been identified in the Robot Operating System (ROS) \u0027roslaunch\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code." } ], "value": "A code injection vulnerability has been identified in the Robot Operating System (ROS) \u0027roslaunch\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability arises from the use of the eval() method to process user-supplied, unsanitized parameter values within the substitution args mechanism, which roslaunch evaluates before launching a node. This flaw allows attackers to craft and execute arbitrary Python code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:04:28.875Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in roslaunch tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-39835", "datePublished": "2025-07-17T19:12:08.177Z", "dateReserved": "2024-08-08T14:41:22.665Z", "dateUpdated": "2025-07-18T08:04:28.875Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41148 (GCVE-0-2024-41148)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41148", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:36:47.021797Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:36:53.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rostopic" ], "packageName": "rostopic", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027hz\u0027 verb, which reports the publishing rate of a topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027hz\u0027 verb, which reports the publishing rate of a topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:04:55.109Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rostopic hz tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-41148", "datePublished": "2025-07-17T19:12:54.440Z", "dateReserved": "2024-08-01T12:00:12.200Z", "dateUpdated": "2025-07-18T08:04:55.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-41921 (GCVE-0-2024-41921)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.ros.org/blog/noetic-eol/ | product |
Vendor | Product | Version | ||
---|---|---|---|---|
Open Source Robotics Foundation | Robot Operating System (ROS) |
Version: Noetic Ninjemys Version: Melodic Morenia Version: Kinetic Kame Version: Indigo Igloo |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-41921", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T20:37:06.242493Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-17T20:37:17.375Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "rostopic" ], "packageName": "rostopic", "platforms": [ "Linux", "Windows", "MacOS" ], "product": "Robot Operating System (ROS)", "repo": "https://github.com/ros/ros_comm", "vendor": "Open Source Robotics Foundation", "versions": [ { "status": "affected", "version": "Noetic Ninjemys" }, { "status": "affected", "version": "Melodic Morenia" }, { "status": "affected", "version": "Kinetic Kame" }, { "status": "affected", "version": "Indigo Igloo" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Florencia Cabral Berenfus, Ubuntu Robotics Team" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027echo\u0027 verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "value": "A code injection vulnerability has been discovered in the Robot Operating System (ROS) \u0027rostopic\u0027 command-line tool, affecting ROS distributions Noetic Ninjemys and earlier. The vulnerability lies in the \u0027echo\u0027 verb, which allows a user to introspect a ROS topic and accepts a user-provided Python expression via the --filter option. This input is passed directly to the eval() function without sanitization, allowing a local user to craft and execute arbitrary code." } ], "impacts": [ { "capecId": "CAPEC-586", "descriptions": [ { "lang": "en", "value": "CAPEC-586 Object Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-18T08:05:08.288Z", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "product" ], "url": "https://www.ros.org/blog/noetic-eol/" } ], "solutions": [ { "lang": "en", "value": "All ROS (1) versions are EOL, upgrade to a ROS 2 version." } ], "source": { "discovery": "INTERNAL" }, "title": "Unsafe use of eval() method in rostopic echo tool" } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2024-41921", "datePublished": "2025-07-17T19:13:34.025Z", "dateReserved": "2024-08-08T14:41:22.680Z", "dateUpdated": "2025-07-18T08:05:08.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-7954 (GCVE-0-2024-7954)
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://vulncheck.com/advisories/spip-porte-plume | third-party-advisory | |
https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-0-alpha2-SPIP-4-2-13-SPIP-4.html | vendor-advisory | |
https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/ | technical-description, exploit |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:spip:spip:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "spip", "vendor": "spip", "versions": [ { "lessThan": "4.3.0-alpha2", "status": "affected", "version": "4.3.0-alpha", "versionType": "custom" }, { "lessThan": "4.2.13", "status": "affected", "version": "4.2.0", "versionType": "semver" }, { "lessThan": "4.1.16", "status": "affected", "version": "4.1.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7954", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-23T18:26:49.808289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-23T18:31:44.888Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SPIP", "vendor": "SPIP", "versions": [ { "lessThan": "4.3.0-alpha2", "status": "affected", "version": "4.3.0-alpha", "versionType": "custom" }, { "lessThan": "4.2.13", "status": "affected", "version": "4.2.0", "versionType": "semver" }, { "lessThan": "4.1.16", "status": "affected", "version": "4.1.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Louka Jacques-Chevallier" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request.\u003cbr\u003e" } ], "value": "The porte_plume plugin used by SPIP before 4.30-alpha2, 4.2.13, and 4.1.16 is vulnerable to an arbitrary code execution vulnerability. A remote and unauthenticated attacker can execute arbitrary PHP as the SPIP user by sending a crafted HTTP request." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1286", "description": "CWE-1286 Improper Validation of Syntactic Correctness of Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-23T15:42:33.988Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/spip-porte-plume" }, { "tags": [ "vendor-advisory" ], "url": "https://blog.spip.net/Mise-a-jour-critique-de-securite-sortie-de-SPIP-4-3-0-alpha2-SPIP-4-2-13-SPIP-4.html" }, { "tags": [ "technical-description", "exploit" ], "url": "https://thinkloveshare.com/hacking/spip_preauth_rce_2024_part_1_the_feather/" } ], "source": { "discovery": "UNKNOWN" }, "title": "SPIP porte_plume Plugin Arbitrary PHP Execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2024-7954", "datePublished": "2024-08-23T17:43:20.967Z", "dateReserved": "2024-08-19T18:16:30.180Z", "dateUpdated": "2025-09-23T15:42:33.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phases: Architecture and Design, Implementation
Description:
- If possible, refactor your code so that it does not need to use eval() at all.
Mitigation ID: MIT-5
Phase: Implementation
Strategy: Input Validation
Description:
- Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.
- When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."
- Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.
Mitigation
Phase: Implementation
Description:
- Inputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180, CWE-181). Make sure that your application does not inadvertently decode the same input twice (CWE-174). Such errors could be used to bypass allowlist schemes by introducing dangerous inputs after they have been checked. Use libraries such as the OWASP ESAPI Canonicalization control.
- Consider performing repeated canonicalization until your input does not change any more. This will avoid double-decoding and similar scenarios, but it might inadvertently modify inputs that are allowed to contain properly-encoded dangerous content.
Mitigation
Phase: Implementation
Description:
- For Python programs, it is frequently encouraged to use the ast.literal_eval() function instead of eval, since it is intentionally designed to avoid executing code. However, an adversary could still cause excessive memory or stack consumption via deeply nested structures [REF-1372], so the python documentation discourages use of ast.literal_eval() on untrusted data [REF-1373].
CAPEC-35: Leverage Executable Code in Non-Executable Files
An attack of this type exploits a system's trust in configuration and resource files. When the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high.