High severity8.6NVD Advisory· Published Sep 18, 2024· Updated Apr 15, 2026
CVE-2023-47105
CVE-2023-47105
Description
exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/chaosblade-io/chaosbladeGo | >= 0.0.3, < 1.7.4 | 1.7.4 |
Patches
16bc73c31e14efix: Temporarily disable server mode.
2 files changed · +3 −21
cli/cmd/cmd.go+1 −6 modified@@ -55,12 +55,7 @@ func CmdInit() *baseCommand { queryCommand.AddCommand(&QueryJvmCommand{}) queryCommand.AddCommand(&QueryK8sCommand{}) - // add server command - serverCommand := &ServerCommand{} - baseCmd.AddCommand(serverCommand) - serverCommand.AddCommand(&StartServerCommand{}) - serverCommand.AddCommand(&StopServerCommand{}) - serverCommand.AddCommand(&StatusServerCommand{}) + // UPDATE 2023-12-30 Disable server command mode. // add check command checkCommand := &CheckCommand{}
cli/cmd/server_start.go+2 −15 modified@@ -123,7 +123,7 @@ func (ssc *StartServerCommand) start0() { go func() { err := http.ListenAndServe(ssc.ip+":"+ssc.port, nil) if err != nil { - log.Errorf(context.Background(),"start blade server error, %v", err) + log.Errorf(context.Background(), "start blade server error, %v", err) //log.Error(err, "start blade server error") os.Exit(1) } @@ -134,20 +134,7 @@ func (ssc *StartServerCommand) start0() { func Register(requestPath string) { http.HandleFunc(requestPath, func(writer http.ResponseWriter, request *http.Request) { - err := request.ParseForm() - if err != nil { - fmt.Fprintf(writer, spec.ReturnFail(spec.ParameterRequestFailed, err.Error()).Print()) - return - } - cmds := request.Form["cmd"] - if len(cmds) != 1 { - fmt.Fprintf(writer, spec.ResponseFailWithFlags(spec.ParameterLess, "cmd").Print()) - return - } - ctx := context.WithValue(context.Background(), "mode", "server") - response := channel.NewLocalChannel().Run(ctx, path.Join(util.GetProgramPath(), "blade"), cmds[0]) - log.Debugf(ctx, "Server response: %v", response) - fmt.Fprintf(writer, response.Print()) + fmt.Fprintf(writer, spec.ReturnFail(spec.CommandIllegal, "Server mode is disabled").Print()) }) }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-723h-x37g-f8qmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-47105ghsaADVISORY
- github.com/chaosblade-io/chaosblade/blob/0a07380c9899febb2b544132783b376b44226cca/exec/os/executor.gonvdWEB
- github.com/chaosblade-io/chaosblade/commit/6bc73c31e14ea2b1bfc30f359e1fe952859d9adcghsaWEB
- narrow-oatmeal-0c0.notion.site/ChaosBlade-Remote-Command-Execution-CVE-2023-47105-4f5459046488436caaec2bced6ff26d7nvdWEB
News mentions
0No linked articles in our index yet.