CVE-2024-28892

An OS command injection vulnerability exists in the name parameter of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*

History

20 Dec 2024, 17:05

Type Values Removed Values Added
First Time Mayuresh82
Mayuresh82 gocast
CPE cpe:2.3:a:mayuresh82:gocast:1.1.3:*:*:*:*:*:*:*
Summary
  • (es) Existe una vulnerabilidad de inyección de comandos del sistema operativo en el parámetro de nombre de GoCast 1.1.3. Una solicitud HTTP especialmente manipulada puede provocar la ejecución de un comando arbitrario. Un atacante puede realizar una solicitud HTTP no autenticada para activar esta vulnerabilidad.
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960 - Third Party Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1960 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1960 - Third Party Advisory

21 Nov 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-21 15:15

Updated : 2024-12-20 17:05


NVD link : CVE-2024-28892

Mitre link : CVE-2024-28892

CVE.ORG link : CVE-2024-28892


JSON object : View

Products Affected

mayuresh82

  • gocast
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')