PT-2024-24235 · Tiagorlampert · Chaos
Published
2024-04-12
·
Updated
2025-09-19
·
CVE-2024-31839
CVSS v3.1
4.8
Medium
| Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
tiagorlampert CHAOS version 5.0.1
Description
The issue allows a remote attacker to escalate privileges via the
sendCommandHandler function in the handler.go component. This is a form of Cross Site Scripting (XSS) that may enable a malicious actor to extract a JWT token by sending a malicious "/command" request.Recommendations
For tiagorlampert CHAOS version 5.0.1, consider disabling the
sendCommandHandler function in the handler.go component as a temporary workaround until a patch is available. Restrict access to the "/command" API endpoint to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Chaos