CVE-2024-53992
unzip-bot Allows Remote Code Execution (RCE) via archive extraction, password prompt, or video upload
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
unzip-bot is a Telegram bot to extract various types of archives. Users could exploit unsanitized inputs to inject malicious commands that are executed through subprocess.Popen with shell=True. Attackers can exploit this vulnerability using a crafted archive name, password, or video name. This vulnerability is fixed in 7.0.3a.
unzip-bot es un bot de Telegram que extrae distintos tipos de archivos. Los usuarios podrían aprovechar las entradas no desinfectadas para inyectar comandos maliciosos que se ejecutan a través de subprocess.Popen con shell=True. Los atacantes pueden aprovechar esta vulnerabilidad utilizando un nombre de archivo, una contraseña o un nombre de video manipulados. Esta vulnerabilidad se corrigió en la versión 7.0.3a.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-11-25 CVE Reserved
- 2024-12-02 CVE Published
- 2024-12-03 EPSS Updated
- 2024-12-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/EDM115/unzip-bot/commit/5213b693eabb562842cdbf21c1074e91bfa00274 | X_refsource_misc | |
https://github.com/EDM115/unzip-bot/security/advisories/GHSA-34cg-7f8c-fm5h | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|