CVE-2024-35058: NASA AIT-Core vulnerable to remote code execution
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.23217%
CWE
Published
5/21/2024
Updated
11/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ait-core | pip | <= 2.5.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions the API wait function as the attack vector. Multiple sources (GitHub advisory, LinkedIn article, and GitHub issue #528) confirm the use of eval() with untrusted input in this function. The eval() function's inherent insecurity when processing uncontrolled strings makes this a clear code injection vulnerability. While other potential vulnerabilities exist in the system (e.g., TLM packet expressions), the CVE-2024-35058 specifically references the wait function as the entry point for RCE.