CVE-2024-10224
 
Severity Score
5.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
*Credits:
Qualys, Roderich Schupp, Mark Esler
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-10-21 CVE Reserved
- 2024-11-19 CVE Published
- 2024-11-19 CVE Updated
- 2024-11-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://www.cve.org/CVERecord?id=CVE-2024-10224 | Issue Tracking | |
https://www.qualys.com/2024/11/19/needrestart/needrestart.txt | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529 | 2024-11-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Module ScanDeps Search vendor "Module ScanDeps" | Module ScanDeps Search vendor "Module ScanDeps" for product "Module ScanDeps" | < 1.38 Search vendor "Module ScanDeps" for product "Module ScanDeps" and version " < 1.38" | en |
Affected
|