### [CVE-2024-0195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0195) ![](https://img.shields.io/static/v1?label=Product&message=spider-flow&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%200.4.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Code%20Injection&color=brighgreen) ### Description A vulnerability, which was classified as critical, was found in spider-flow 0.4.3. Affected is the function FunctionService.saveFunction of the file src/main/java/org/spiderflow/controller/FunctionController.java. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249510 is the identifier assigned to this vulnerability. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Marco-zcl/POC - https://github.com/Tropinene/Yscanner - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile - https://github.com/wjlin0/poc-doc - https://github.com/wy876/POC - https://github.com/wy876/wiki - https://github.com/xingchennb/POC-