2024-09-04 16:03:36 +00:00

64 lines
2.8 KiB
JSON

{
"id": "CVE-2024-44809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-03T22:15:04.590",
"lastModified": "2024-09-04T14:35:12.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution (RCE) vulnerability exists in the Pi Camera project, version 1.0, maintained by RECANTHA. The issue arises from improper sanitization of user input passed to the \"position\" GET parameter in the tilt.php script. An attacker can exploit this by sending crafted input data that includes malicious command sequences, allowing arbitrary commands to be executed on the server with the privileges of the web server user. This vulnerability is exploitable remotely and poses significant risk if the application is exposed to untrusted networks."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto (RCE) en el proyecto Pi Camera, versi\u00f3n 1.0, mantenido por RECANTHA. El problema surge de una desinfecci\u00f3n inadecuada de la entrada del usuario que se pasa al par\u00e1metro GET \"position\" en el script tilt.php. Un atacante puede aprovechar esto enviando datos de entrada creados que incluyen secuencias de comandos maliciosas, lo que permite ejecutar comandos arbitrarios en el servidor con los privilegios del usuario del servidor web. Esta vulnerabilidad se puede explotar de forma remota y plantea un riesgo significativo si la aplicaci\u00f3n se expone a redes que no son de confianza."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/recantha/camera-pi/blob/ef018d212288cb16404f0b050593d20f0dc0467b/www/tilt.php#L4",
"source": "cve@mitre.org"
},
{
"url": "https://jacobmasse.medium.com/cve-2024-44809-remote-code-execution-in-raspberry-pi-camera-project-4b8e3486a628",
"source": "cve@mitre.org"
}
]
}