A command inject vulnerability allows an attacker to perform command injection on Windows applications that indirectly depend on the CreateProcess function when the specific conditions are satisfied.
References
Configurations
Configuration 1 (hide)
AND |
|
History
17 Jun 2025, 20:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ - Exploit, Third Party Advisory | |
References | () https://kb.cert.org/vuls/id/123335 - Third Party Advisory | |
References | () https://learn.microsoft.com/en-us/archive/blogs/twistylittlepassagesallalike/everyone-quotes-command-line-arguments-the-wrong-way - Technical Description | |
References | () https://www.cve.org/CVERecord?id=CVE-2024-1874 - Not Applicable | |
References | () https://www.cve.org/CVERecord?id=CVE-2024-22423 - Not Applicable | |
References | () https://www.cve.org/CVERecord?id=CVE-2024-24576 - Not Applicable | |
References | () https://www.kb.cert.org/vuls/id/123335 - Not Applicable | |
CPE | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* cpe:2.3:a:rust-lang:rust:1.77.2:*:*:*:*:*:*:* cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:*:*:*:* cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* cpe:2.3:a:haskell:process_library:1.6.19.0:*:*:*:*:*:*:* cpe:2.3:a:golang:go:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
First Time |
Nodejs
Php php Microsoft windows Haskell Yt-dlp Project Golang Php Nodejs node.js Haskell process Library Microsoft Rust-lang Rust-lang rust Yt-dlp Project yt-dlp Golang go |
|
CWE | CWE-77 |
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/ - | |
References | () https://kb.cert.org/vuls/id/123335 - | |
References | () https://learn.microsoft.com/en-us/archive/blogs/twistylittlepassagesallalike/everyone-quotes-command-line-arguments-the-wrong-way - | |
References | () https://www.cve.org/CVERecord?id=CVE-2024-1874 - | |
References | () https://www.cve.org/CVERecord?id=CVE-2024-22423 - | |
References | () https://www.cve.org/CVERecord?id=CVE-2024-24576 - | |
References | () https://www.kb.cert.org/vuls/id/123335 - |
22 Aug 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
10 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 16:15
Updated : 2025-06-17 20:56
NVD link : CVE-2024-3566
Mitre link : CVE-2024-3566
CVE.ORG link : CVE-2024-3566
JSON object : View
Products Affected
php
- php
microsoft
- windows
yt-dlp_project
- yt-dlp
haskell
- process_library
rust-lang
- rust
golang
- go
nodejs
- node.js
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')