cve/2023/CVE-2023-1277.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-1277](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1277)
![](https://img.shields.io/static/v1?label=Product&message=kylin-system-updater&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.4.20kord%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Command%20Injection&color=brighgreen)
### Description
A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord on Ubuntu Kylin. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600.
### POC
#### Reference
- https://github.com/cn-lwj/vuldb/blob/master/kylin-system-updater_vuln.md
2024-06-09 00:33:16 +00:00
- https://github.com/cn-lwj/vuldb/blob/master/kylin-system-updater_vuln.md
2024-05-25 21:48:12 +02:00
- https://vuldb.com/?id.222600
2024-06-09 00:33:16 +00:00
- https://vuldb.com/?id.222600
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.