Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-21623
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Arbitrary Expression Injection in github workflow leads to Command execution & leaking secrets
Source: NVD (National Vulnerability Database)
Vulnerability Description
OTCLient is an alternative tibia client for otserv. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. Commit db560de0b56476c87a2f967466407939196dd254 contains a fix for this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输出中的特殊元素转义处理不恰当(注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
OTCLient 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OTCLient是用 C++20 和 Lua 编写的 otserv 的替代 tibia 客户端,采用模块化系统制成,使用 lua 脚本实现游戏内界面和功能。 OTCLient存在注入漏洞。攻击者利用该漏洞在运行器上远程运行命令、泄露机密并使用此工作流程更改存储库。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
mehahotclient < db560de0b56476c87a2f967466407939196dd254 -
II. Public POCs for CVE-2024-21623
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-21623
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-21623

No comments yet


Leave a comment