PT-2024-24235 · Tiagorlampert · Chaos
Published
2024-04-12
·
Updated
2025-08-27
·
CVE-2024-31839
CVSS v3.1
4.8
4.8
Medium
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions:
tiagorlampert CHAOS version 5.0.1
Description:
A Cross Site Scripting (XSS) vulnerability exists in tiagorlampert CHAOS. A remote attacker may be able to escalate privileges via the `sendCommandHandler` function in the `handler.go` component. A malicious actor may be able to extract a JWT (JSON Web Token) token via a malicious "/command" request.
Recommendations:
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
XSS
Weakness Enumeration
Related Identifiers
CVE-2024-31839
GHSA-C5RV-HJJC-JV7M
GO-2024-2721
Affected Products
Chaos
References · 16
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/chaos_rat_xss_to_rce.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents · Exploit
- https://osv.dev/vulnerability/GO-2024-2721 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-c5rv-hjjc-jv7m · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-31839 · Security Note
- https://osv.dev/vulnerability/CVE-2024-31839 · Vendor Advisory
- https://github.com/tiagorlampert/CHAOS⭐ 2552 🔗 556 · Note
- https://t.me/cvenotify/76577 · Telegram Post
- https://t.me/cvenotify/85355 · Telegram Post
- https://twitter.com/CVEnew/status/1779016069145112820 · Twitter Post
- https://t.me/true_secator/7370 · Telegram Post
- https://t.me/cybersecuritytechnologies/10682 · Telegram Post
- https://twitter.com/TweetThreatNews/status/1930840231294521666 · Twitter Post
- https://t.me/aptreports/19325 · Telegram Post
- https://t.me/aptreports/20037 · Telegram Post