CVE-2024-33434: tiagorlampert CHAOS vulnerable to arbitrary code execution
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88242%
CWE
Published
5/7/2024
Updated
7/5/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/tiagorlampert/CHAOS | go | < 0.0.0-20220716132853-b47438d36e3a | 0.0.0-20220716132853-b47438d36e3a |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsafe concatenation of user-controlled 'filename' into a command string (buildStr) that gets executed. The pre-patch code in client_service.go directly used input.Filename without validate(), allowing OS command injection. The patch adds validation (utils.NormalizeString) and input checks, confirming the previous lack of sanitization. The CWE-78 classification and GitHub advisory both explicitly identify command injection via filename parameter as the attack vector.