An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
References
Configurations
Configuration 1 (hide)
|
History
23 Jan 2025, 20:44
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:* | |
First Time |
Aviatrix
Aviatrix controller |
|
References | () https://docs.aviatrix.com/documentation/latest/network-security/index.html - Product | |
References | () https://docs.aviatrix.com/documentation/latest/release-notices/psirt-advisories/psirt-advisories.html?expand=true#remote-code-execution-vulnerability-in-aviatrix-controllers - Vendor Advisory | |
References | () https://www.securing.pl/en/cve-2024-50603-aviatrix-network-controller-command-injection-vulnerability/ - Exploit, Third Party Advisory |
17 Jan 2025, 02:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Jan 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-08 01:15
Updated : 2025-01-23 20:44
NVD link : CVE-2024-50603
Mitre link : CVE-2024-50603
CVE.ORG link : CVE-2024-50603
JSON object : View
Products Affected
aviatrix
- controller
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')