The CRUDDIY project is vulnerable to shell command injection via sending a crafted POST request to the application server. The exploitation risk is limited since CRUDDIY is meant to be launched locally. Nevertheless, a user with the project running on their computer might visit a website which would send such a malicious request to the locally launched server.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://cert.pl/en/posts/2024/06/CVE-2024-4748 | third party advisory |
https://cert.pl/posts/2024/06/CVE-2024-4748 | third party advisory |
https://github.com/jan-vandenberg/cruddiy/issues/67 | issue tracking |