Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fh7x-m234-3vg3

Опубликовано: 10 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

An OS command injection vulnerability exists in Mako Server versions 2.5 and 2.6, specifically within the tutorial interface provided by the examples/save.lsp endpoint. An unauthenticated attacker can send a crafted PUT request containing arbitrary Lua os.execute() code, which is then persisted on disk and triggered via a subsequent GET request to examples/manage.lsp. This allows remote command execution on the underlying operating system, impacting both Windows and Unix-based deployments.

An OS command injection vulnerability exists in Mako Server versions 2.5 and 2.6, specifically within the tutorial interface provided by the examples/save.lsp endpoint. An unauthenticated attacker can send a crafted PUT request containing arbitrary Lua os.execute() code, which is then persisted on disk and triggered via a subsequent GET request to examples/manage.lsp. This allows remote command execution on the underlying operating system, impacting both Windows and Unix-based deployments.

EPSS

Процентиль: 98%
0.45366
Средний

9.3 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
7 месяцев назад

An OS command injection vulnerability exists in Mako Server versions 2.5 and 2.6, specifically within the tutorial interface provided by the examples/save.lsp endpoint. An unauthenticated attacker can send a crafted PUT request containing arbitrary Lua os.execute() code, which is then persisted on disk and triggered via a subsequent GET request to examples/manage.lsp. This allows remote command execution on the underlying operating system, impacting both Windows and Unix-based deployments.

EPSS

Процентиль: 98%
0.45366
Средний

9.3 Critical

CVSS4

Дефекты

CWE-78