You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
andrasbacsai
published
GHSA-ccp8-v65g-m526Jan 24, 2025
Package
No package listed
Affected versions
v4.0.0-beta.358
Patched versions
v4.0.0-beta.359
Description
Bug discovered by me, report write up and PoC by @Darker-Ink.
Summary
When creating or updating a "project," it is possible to inject arbitrary shell commands by altering the project name. If a name includes unescaped characters, such as single quotes ('), it breaks out of the intended command structure, allowing attackers to execute arbitrary commands on the host system.
Steps to Reproduce
Create or edit a project (can be either a new project or an existing one).
Bug discovered by me, report write up and PoC by @Darker-Ink.
Summary
When creating or updating a "project," it is possible to inject arbitrary shell commands by altering the project name. If a name includes unescaped characters, such as single quotes (
'
), it breaks out of the intended command structure, allowing attackers to execute arbitrary commands on the host system.Steps to Reproduce
'Testing Lol; echo vulnerable > /root/injection_test #'
/root/injection_test
file.Proof of Concept (PoC)
We used the following Dockerfile in combination with the https://github.com/wdhdev/reminders repository:
hNQcr4R.mp4
We tested this vulnerability with v4.0.0-beta.358, however it is likely previous versions are also affected.
Impact
This vulnerability poses a severe security risk, as it allows attackers to:
Attackers with access to project management features could exploit this flaw to gain unauthorized control over the host environment.