CVE-2024-4748

The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server.  The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:j11g:cruddiy:*:*:*:*:*:*:*:*

History

26 Jun 2024, 14:07

Type Values Removed Values Added
First Time J11g
J11g cruddiy
CPE cpe:2.3:a:j11g:cruddiy:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-78
References () https://cert.pl/en/posts/2024/06/CVE-2024-4748 - () https://cert.pl/en/posts/2024/06/CVE-2024-4748 - Third Party Advisory
References () https://github.com/jan-vandenberg/cruddiy/issues/67 - () https://github.com/jan-vandenberg/cruddiy/issues/67 - Issue Tracking
References () https://cert.pl/posts/2024/06/CVE-2024-4748 - () https://cert.pl/posts/2024/06/CVE-2024-4748 - Third Party Advisory

24 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-24 14:15

Updated : 2024-10-10 16:15


NVD link : CVE-2024-4748

Mitre link : CVE-2024-4748


JSON object : View

Products Affected

j11g

  • cruddiy
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')