{ "id": "CVE-2024-38366", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-01T21:15:03.797", "lastModified": "2024-11-21T09:25:28.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. The part of trunk which verifies whether a user has a real email address on signup used a rfc-822 library which executes a shell command to validate the email domain MX records validity. It works via an DNS MX. This lookup could be manipulated to also execute a command on the trunk server, effectively giving root access to the server and the infrastructure. This issue was patched server-side with commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 in September 2023. This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk." }, { "lang": "es", "value": "trunk.cocoapods.org es el servidor de autenticaci\u00f3n para el administrador de dependencias de CoacoaPods. La parte del tronco que verifica si un usuario tiene una direcci\u00f3n de correo electr\u00f3nico real al registrarse utiliz\u00f3 una librer\u00eda rfc-822 que ejecuta un comando de shell para validar la validez de los registros MX del dominio de correo electr\u00f3nico. Funciona a trav\u00e9s de un DNS MX. Esta b\u00fasqueda podr\u00eda manipularse para ejecutar tambi\u00e9n un comando en el servidor troncal, otorgando efectivamente acceso ra\u00edz al servidor y a la infraestructura. Este problema se solucion\u00f3 en el lado del servidor con el commit 001cc3a430e75a16307f5fd6cdff1363ad2f40f3 en septiembre de 2023. Este RCE desencaden\u00f3 un restablecimiento completo de la sesi\u00f3n del usuario, ya que un atacante podr\u00eda haber usado este m\u00e9todo para escribir en cualquier Podspec en el tronco." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 10.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 6.0 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 10.0, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 6.0 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-74" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-74" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cocoapods:trunk.cocoapods.org:*:*:*:*:ruby:*:*:*", "versionEndExcluding": "2023-09-22", "matchCriteriaId": "08A4E3D6-3E6A-4AC3-B671-3CF25F7474CE" } ] } ] } ], "references": [ { "url": "https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023", "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#2-remote-code-execution-on-the-cocoapods-trunk-server", "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-x2x4-g675-qg7c", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#2-remote-code-execution-on-the-cocoapods-trunk-server", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-x2x4-g675-qg7c", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }