mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
77 lines
2.8 KiB
JSON
77 lines
2.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2024-23749",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "KiTTY versions 0.76.1.13 and before is vulnerable to command injection via the filename variable, occurs due to insufficient input sanitization and validation, failure to escape special characters, and insecure system calls (at lines 2369-2390). This allows an attacker to add inputs inside the filename variable, leading to arbitrary code execution."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html",
|
|
"url": "http://packetstormsecurity.com/files/177031/KiTTY-0.76.1.13-Command-Injection.html"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "https://blog.defcesco.io/CVE-2024-23749",
|
|
"url": "https://blog.defcesco.io/CVE-2024-23749"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20240213 Command Injection Vulnerability in KiTTY Get Remote File Through SCP Input (CVE-2024-23749)",
|
|
"url": "http://seclists.org/fulldisclosure/2024/Feb/13"
|
|
},
|
|
{
|
|
"refsource": "FULLDISC",
|
|
"name": "20240213 Buffer Overflow Vulnerabilities in KiTTY Start Duplicated Session Hostname (CVE-2024-25003) & Username (CVE-2024-25004) Variables",
|
|
"url": "http://seclists.org/fulldisclosure/2024/Feb/14"
|
|
}
|
|
]
|
|
}
|
|
} |