PT-2024-5024 · Tiagorlampert · Chaos

Published

2024-04-05

·

Updated

2025-08-27

·

CVE-2024-30850

CVSS v2.0
9.0
VectorAV:N/AC:L/Au:S/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions: tiagorlampert CHAOS version 5.0.1 tiagorlampert CHAOS versions before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e
Description: The issue allows a remote attacker to execute arbitrary code via the
BuildClient
function within
client service.go
. This is due to the lack of measures to neutralize special elements used in the operating system command. The exploitation of this issue may allow a remote attacker to execute arbitrary code. A remote attacker can also execute arbitrary commands via crafted HTTP requests.
Recommendations: For tiagorlampert CHAOS version 5.0.1, consider disabling the
BuildClient
function within
client service.go
until a patch is available. For tiagorlampert CHAOS versions before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e, update to a version that includes the necessary security fixes to prevent the unsafe concatenation of the
filename
argument into the
buildStr
string. As a temporary workaround, restrict access to the
client service.go
file to minimize the risk of exploitation. Avoid using the
filename
argument in the affected
buildStr
string until the issue is resolved.

Exploit

Fix

Command Injection

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2024-05548
CVE-2024-30850
GHSA-P3J6-F45H-HW5F
GHSA-XFJJ-F699-RC79
GO-2024-2822

Affected Products

Chaos