VYPR

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

BaseStableLikelihood: High

Description

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

Hierarchy (View 1000)

Parents

Children

none

Related attack patterns (CAPEC)

CAPEC-108 · CAPEC-15 · CAPEC-43 · CAPEC-6 · CAPEC-88

CVEs mapped to this weakness (1,367)

page 44 of 69
  • CVE-2024-21532HigOct 8, 2024
    risk 0.47cvss 7.3epss 0.00

    All versions of the package ggit are vulnerable to Command Injection via the fetchTags(branch) API, which allows user input to specify the branch to be fetched and then concatenates this string along with a git command which is then passed to the unsafe exec() Node.js child process API.

  • CVE-2024-42503HigSep 17, 2024
    risk 0.47cvss 7.2epss 0.00

    Authenticated command execution vulnerability exist in the ArubaOS command line interface (CLI). Successful exploitation of this vulnerabilities result in the ability to run arbitrary commands as a priviledge user on the underlying operating system.

  • CVE-2024-42502HigSep 17, 2024
    risk 0.47cvss 7.2epss 0.00

    Authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability result in the ability to inject shell commands on the underlying operating system.

  • CVE-2024-8281HigSep 13, 2024
    risk 0.47cvss 7.2epss 0.00

    An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection through specially crafted command line input in the XCC SSH captive shell.

  • CVE-2024-8280HigSep 13, 2024
    risk 0.47cvss 7.2epss 0.00

    An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.

  • CVE-2024-8279HigSep 13, 2024
    risk 0.47cvss 7.2epss 0.00

    A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • CVE-2024-8278HigSep 13, 2024
    risk 0.47cvss 7.2epss 0.00

    A privilege escalation vulnerability was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • CVE-2024-7728HigAug 14, 2024
    risk 0.47cvss 7.2epss 0.01

    The specific CGI of the CAYIN Technology CMS does not properly validate user input, allowing a remote attacker with administrator privileges to inject OS commands into the specific parameter and execute them on the remote server.

  • CVE-2024-42370HigAug 12, 2024
    risk 0.47cvss 8.3epss 0.01

    Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. In versions 2.10.0 and prior, Litestar's `docs-preview.yml` workflow is vulnerable to Environment Variable injection which may lead to secret exfiltration and repository manipulation. This issue grants a malicious actor the permission to write issues, read metadata, and write pull requests. In addition, the `DOCS_PREVIEW_DEPLOY_TOKEN` is exposed to the attacker. Commit 84d351e96aaa2a1338006d6e7221eded161f517b contains a fix for this issue.

  • CVE-2024-38512HigJul 26, 2024
    risk 0.47cvss 7.2epss 0.01

    A privilege escalation vulnerability was discovered in XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted IPMI commands.

  • CVE-2024-38511HigJul 26, 2024
    risk 0.47cvss 7.2epss 0.00

    A privilege escalation vulnerability was discovered in an upload processing functionality of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • CVE-2024-38510HigJul 26, 2024
    risk 0.47cvss 7.2epss 0.01

    A privilege escalation vulnerability was discovered in the SSH captive command shell interface that could allow an authenticated XCC user with elevated privileges to perform command injection via specially crafted file uploads.

  • CVE-2024-38508HigJul 26, 2024
    risk 0.47cvss 7.2epss 0.01

    A privilege escalation vulnerability was discovered in the web interface or SSH captive command shell interface of XCC that could allow an authenticated XCC user with elevated privileges to perform command injection via a specially crafted request.

  • CVE-2024-28750HigJul 9, 2024
    risk 0.47cvss 7.2epss 0.01

    A remote attacker with high privileges may use a deleting file function to inject OS commands.

  • CVE-2024-28749HigJul 9, 2024
    risk 0.47cvss 7.2epss 0.01

    A remote attacker with high privileges may use a writing file function to inject OS commands.

  • CVE-2024-28748HigJul 9, 2024
    risk 0.47cvss 7.2epss 0.01

    A remote attacker with high privileges may use a reading file function to inject OS commands.

  • CVE-2024-5672HigJul 3, 2024
    risk 0.47cvss 7.2epss 0.01

    A high privileged remote attacker can execute arbitrary system commands via GET requests due to improper neutralization of special elements used in an OS command.

  • CVE-2024-31162HigJun 14, 2024
    risk 0.47cvss 7.2epss 0.01

    The specific function parameter of ASUS Download Master does not properly filter user input. An unauthenticated remote attacker with administrative privileges can exploit this vulnerability to execute arbitrary system commands on the device.

  • CVE-2024-5403HigMay 27, 2024
    risk 0.47cvss 7.2epss 0.01

    ASKEY 5G NR Small Cell fails to properly filter user input for certain functionality, allowing remote attackers with administrator privilege to execute arbitrary system commands on the remote server.

  • CVE-2024-0401HigMay 20, 2024
    risk 0.47cvss 7.2epss 0.03

    ASUS routers supporting custom OpenVPN profiles are vulnerable to a code execution vulnerability. An authenticated and remote attacker can execute arbitrary operating system commands by uploading a crafted OVPN profile. Known affected routers include ASUS ExpertWiFi, ASUS RT-AX55, ASUS RT-AX58U, ASUS RT-AC67U, ASUS RT-AC68R, ASUS RT-AC68U, ASUS RT-AX86, ASUS RT-AC86U, ASUS RT-AX88U, and ASUS RT-AX3000.