CVE-2024-21574
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The issue stems from a missing validation of the pip field in a POST request sent to the /customnode/install endpoint used to install custom nodes which is added to the server by the extension. This allows an attacker to craft a request that triggers a pip install on a user controlled package or URL, resulting in remote code execution (RCE) on the server.
El problema surge de una falta de validación del campo pip en una solicitud POST enviada al endpoint /customnode/install que se utiliza para instalar nodos personalizados y que la extensión agrega al servidor. Esto permite que un atacante cree una solicitud que active una instalación de pip en un paquete o URL controlados por el usuario, lo que da como resultado una ejecución de código remoto (RCE) en el servidor.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-12-22 CVE Reserved
- 2024-12-12 CVE Published
- 2024-12-12 CVE Updated
- 2024-12-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (2)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ltdrdata Search vendor "Ltdrdata" | ComfyUI-Manager Search vendor "Ltdrdata" for product "ComfyUI-Manager" | < 2.51.1 Search vendor "Ltdrdata" for product "ComfyUI-Manager" and version " < 2.51.1" | en |
Affected
|