Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xgj-vqg4-h895

Опубликовано: 24 фев. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 10

Описание

In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.

In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.

EPSS

Процентиль: 86%
0.0304
Низкий

10 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 10
nvd
12 месяцев назад

In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.

CVSS3: 10
fstec
12 месяцев назад

Уязвимость плагинов Manx и Sandcat автоматизированной системы эмуляции действий нарушителей Caldera, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.0304
Низкий

10 Critical

CVSS3

Дефекты

CWE-78