VYPR
High severity8.6NVD Advisory· Published Sep 18, 2024· Updated Apr 15, 2026

CVE-2023-47105

CVE-2023-47105

Description

exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/chaosblade-io/chaosbladeGo
>= 0.0.3, < 1.7.41.7.4

Patches

1
6bc73c31e14e

fix: Temporarily disable server mode.

2 files changed · +3 21
  • cli/cmd/cmd.go+1 6 modified
    @@ -55,12 +55,7 @@ func CmdInit() *baseCommand {
     	queryCommand.AddCommand(&QueryJvmCommand{})
     	queryCommand.AddCommand(&QueryK8sCommand{})
     
    -	// add server command
    -	serverCommand := &ServerCommand{}
    -	baseCmd.AddCommand(serverCommand)
    -	serverCommand.AddCommand(&StartServerCommand{})
    -	serverCommand.AddCommand(&StopServerCommand{})
    -	serverCommand.AddCommand(&StatusServerCommand{})
    +	// UPDATE 2023-12-30 Disable server command mode.
     
     	// add check command
     	checkCommand := &CheckCommand{}
    
  • cli/cmd/server_start.go+2 15 modified
    @@ -123,7 +123,7 @@ func (ssc *StartServerCommand) start0() {
     	go func() {
     		err := http.ListenAndServe(ssc.ip+":"+ssc.port, nil)
     		if err != nil {
    -			log.Errorf(context.Background(),"start blade server error, %v", err)
    +			log.Errorf(context.Background(), "start blade server error, %v", err)
     			//log.Error(err, "start blade server error")
     			os.Exit(1)
     		}
    @@ -134,20 +134,7 @@ func (ssc *StartServerCommand) start0() {
     
     func Register(requestPath string) {
     	http.HandleFunc(requestPath, func(writer http.ResponseWriter, request *http.Request) {
    -		err := request.ParseForm()
    -		if err != nil {
    -			fmt.Fprintf(writer, spec.ReturnFail(spec.ParameterRequestFailed, err.Error()).Print())
    -			return
    -		}
    -		cmds := request.Form["cmd"]
    -		if len(cmds) != 1 {
    -			fmt.Fprintf(writer, spec.ResponseFailWithFlags(spec.ParameterLess, "cmd").Print())
    -			return
    -		}
    -		ctx := context.WithValue(context.Background(), "mode", "server")
    -		response := channel.NewLocalChannel().Run(ctx, path.Join(util.GetProgramPath(), "blade"), cmds[0])
    -		log.Debugf(ctx, "Server response: %v", response)
    -		fmt.Fprintf(writer, response.Print())
    +		fmt.Fprintf(writer, spec.ReturnFail(spec.CommandIllegal, "Server mode is disabled").Print())
     	})
     }
     
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.