// For flags

CVE-2024-39906

Remote code execution in Haven IndieAuthClient (GHSL-2024-093)

Severity Score

8.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A command injection vulnerability was found in the IndieAuth functionality of the Ruby on Rails based Haven blog web application. The affected functionality requires authentication, but an attacker can craft a link that they can pass to a logged in administrator of the blog software. This leads to the immediate execution of the provided commands when the link is accessed by the authenticated administrator. This issue may lead to Remote Code Execution (RCE) and has been addressed by commit `c52f07c`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Se encontró una vulnerabilidad de inyección de comandos en la funcionalidad IndieAuth de la aplicación web del blog Haven basada en Ruby on Rails. La funcionalidad afectada requiere autenticación, pero un atacante puede crear un enlace que puede pasar a un administrador del software del blog que haya iniciado sesión. Esto conduce a la ejecución inmediata de los comandos proporcionados cuando el administrador autenticado accede al enlace. Este problema puede provocar la ejecución remota de código (RCE) y se solucionó mediante la confirmación `c52f07c`. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-07-02 CVE Reserved
  • 2024-07-19 CVE Published
  • 2024-07-20 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Havenweb
Search vendor "Havenweb"
Haven
Search vendor "Havenweb" for product "Haven"
*en
Affected