GHSA-8PRR-F8PG-7R49
Vulnerability from github – Published: 2024-04-10 15:30 – Updated: 2024-05-01 21:30
VLAI?
Details
A shell injection vulnerability was discovered in ROS (Robot Operating System) Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS handles shell command execution in components like command interpreters or interfaces that process external inputs.
{
"affected": [],
"aliases": [
"CVE-2024-30726"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-04-10T04:15:10Z",
"severity": null
},
"details": "A shell injection vulnerability was discovered in ROS (Robot Operating System) Kinetic Kame in ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS handles shell command execution in components like command interpreters or interfaces that process external inputs.",
"id": "GHSA-8prr-f8pg-7r49",
"modified": "2024-05-01T21:30:31Z",
"published": "2024-04-10T15:30:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30726"
},
{
"type": "WEB",
"url": "https://github.com/yashpatelphd/CVE-2024-30726"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/04/23/5"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…