PT-2024-24235 · Tiagorlampert · Chaos

Published

2024-04-12

·

Updated

2025-09-19

·

CVE-2024-31839

CVSS v3.1
4.8
VectorAV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Name of the Vulnerable Software and Affected Versions tiagorlampert CHAOS version 5.0.1
Description The issue allows a remote attacker to escalate privileges via the
sendCommandHandler
function in the handler.go component. This is a form of Cross Site Scripting (XSS) that may enable a malicious actor to extract a JWT token by sending a malicious "/command" request.
Recommendations For tiagorlampert CHAOS version 5.0.1, consider disabling the
sendCommandHandler
function in the handler.go component as a temporary workaround until a patch is available. Restrict access to the "/command" API endpoint to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

XSS

Weakness Enumeration

Related Identifiers

CVE-2024-31839
GHSA-C5RV-HJJC-JV7M
GO-2024-2721

Affected Products

Chaos