Miggo Logo

CVE-2024-41111:
Sliver Allows Authenticated Operator-to-Server Remote Code Execution

8.8

CVSS Score
3.1

Basic Information

EPSS Score
0.53073%
Published
7/18/2024
Updated
8/2/2024
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/bishopfox/slivergo>= 1.5.40, <= 1.6.0-dev1.6.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from improper neutralization of the '--advanced' parameter in the generate msf-stager command. The removed GenerateStagerCmd function accepted URI-encoded options that were parsed as msfvenom flags without validation, particularly allowing injection of the '--out' parameter to overwrite critical files. The VenomPayload function in msf.go directly incorporated these untrusted parameters into command execution. The patch completely removed these components, confirming their central role in the vulnerability. The command injection via cobra's flag parsing (before strict validation was added) enabled operators to bypass security boundaries through specially crafted payloads.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## **s*ription Sliv*r v*rsion *.*.* (pr*r*l**s*) is vuln*r**l* to R** on t** t**ms*rv*r *y * low-privil**** "op*r*tor" us*r. T** R** is *s t** syst*m root us*r. ## Imp**t *s **s*ri*** in * [p*st issu*](*ttps://*it*u*.*om/*is*op*ox/sliv*r/issu*s/**)

Reasoning

T** vuln*r**ility st*mm** *rom improp*r n*utr*liz*tion o* t** '--**v*n***' p*r*m*t*r in t** **n*r*t* ms*-st***r *omm*n*. T** r*mov** **n*r*t*St***r*m* *un*tion ****pt** URI-*n*o*** options t**t w*r* p*rs** *s ms*v*nom *l**s wit*out v*li**tion, p*rti*