cve/2017/CVE-2017-15924.md

30 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-15924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15924)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions.
### POC
#### Reference
- http://openwall.com/lists/oss-security/2017/10/13/2
- https://github.com/shadowsocks/shadowsocks-libev/issues/1734
- https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/
#### Github
- https://github.com/201755110121/kcp
- https://github.com/5l1v3r1/docker-shadowsocks
- https://github.com/andir/nixos-issue-db-example
- https://github.com/beermix/docker-ss
- https://github.com/danshan/ssproxy
- https://github.com/hadwinzhy/docker-shadowsocks
- https://github.com/icepyb/myss
- https://github.com/jkhaoqi110/shadowsocks-privoxy
- https://github.com/pluto-pluto/ss
- https://github.com/yueyanglouji/ss-proxy
- https://github.com/zhanglc/shadowsocks