acme.sh before 3.0.6 runs arbitrary commands from a remote server via eval, as exploited in the wild in June 2023.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/acmesh-official/acme.sh/issues/4659 | third party advisory issue tracking |
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/heXVr8o83Ys | third party advisory |
https://news.ycombinator.com/item?id=36252310 | third party advisory |
https://github.com/acmesh-official/acme.sh/releases/tag/3.0.6 | release notes |
https://news.ycombinator.com/item?id=36254093 | third party advisory |
https://www.reddit.com/r/netsec/comments/144ygg7/acmesh_runs_arbitrary_commands_from_a_remote/ | third party advisory |
http://www.openwall.com/lists/oss-security/2023/07/13/1 | third party advisory mailing list |