CVE-2024-3566

A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:haskell:process_library:1.6.19.0:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:rust-lang:rust:1.77.2:*:*:*:*:*:*:*
cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

17 Jun 2025, 20:56

Type Values Removed Values Added
References () https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ - () https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ - Exploit, Third Party Advisory
References () https://kb.cert.org/vuls/id/123335 - () https://kb.cert.org/vuls/id/123335 - Third Party Advisory
References () https://learn.microsoft.com/en-us/archive/blogs/twistylittlepassagesallalike/everyone-quotes-command-line-arguments-the-wrong-way - () https://learn.microsoft.com/en-us/archive/blogs/twistylittlepassagesallalike/everyone-quotes-command-line-arguments-the-wrong-way - Technical Description
References () https://www.cve.org/CVERecord?id=CVE-2024-1874 - () https://www.cve.org/CVERecord?id=CVE-2024-1874 - Not Applicable
References () https://www.cve.org/CVERecord?id=CVE-2024-22423 - () https://www.cve.org/CVERecord?id=CVE-2024-22423 - Not Applicable
References () https://www.cve.org/CVERecord?id=CVE-2024-24576 - () https://www.cve.org/CVERecord?id=CVE-2024-24576 - Not Applicable
References () https://www.kb.cert.org/vuls/id/123335 - () https://www.kb.cert.org/vuls/id/123335 - Not Applicable
CPE cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:rust-lang:rust:1.77.2:*:*:*:*:*:*:*
cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:*:*:*:*
cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
cpe:2.3:a:haskell:process_library:1.6.19.0:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
First Time Nodejs
Php php
Microsoft windows
Haskell
Yt-dlp Project
Golang
Php
Nodejs node.js
Haskell process Library
Microsoft
Rust-lang
Rust-lang rust
Yt-dlp Project yt-dlp
Golang go
CWE CWE-77

21 Nov 2024, 09:29

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de inyección de comandos permite a un atacante realizar inyección de comandos en aplicaciones de Windows que dependen indirectamente de la función CreateProcess cuando se cumplen las condiciones específicas.
References () https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ - () https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ -
References () https://kb.cert.org/vuls/id/123335 - () https://kb.cert.org/vuls/id/123335 -
References () https://learn.microsoft.com/en-us/archive/blogs/twistylittlepassagesallalike/everyone-quotes-command-line-arguments-the-wrong-way - () https://learn.microsoft.com/en-us/archive/blogs/twistylittlepassagesallalike/everyone-quotes-command-line-arguments-the-wrong-way -
References () https://www.cve.org/CVERecord?id=CVE-2024-1874 - () https://www.cve.org/CVERecord?id=CVE-2024-1874 -
References () https://www.cve.org/CVERecord?id=CVE-2024-22423 - () https://www.cve.org/CVERecord?id=CVE-2024-22423 -
References () https://www.cve.org/CVERecord?id=CVE-2024-24576 - () https://www.cve.org/CVERecord?id=CVE-2024-24576 -
References () https://www.kb.cert.org/vuls/id/123335 - () https://www.kb.cert.org/vuls/id/123335 -

22 Aug 2024, 19:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

10 Apr 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 16:15

Updated : 2025-06-17 20:56


NVD link : CVE-2024-3566

Mitre link : CVE-2024-3566

CVE.ORG link : CVE-2024-3566


JSON object : View

Products Affected

php

  • php

microsoft

  • windows

yt-dlp_project

  • yt-dlp

haskell

  • process_library

rust-lang

  • rust

golang

  • go

nodejs

  • node.js
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')