Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-50603
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Aviatrix Controller 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Aviatrix Controller是美国Aviatrix公司的一个应用软件。用云提供商的API来扩展和控制本机结构,从而扩展其功能并将其集成到软件中。 Aviatrix Controller 7.1.4191之前版本和7.2.4996之前的7.2.x版本存在安全漏洞,该漏洞源于操作系统命令中存在特殊元素的不正确中和,导致未认证的攻击者可执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
AviatrixController 0 ~ 7.1.4191 -
II. Public POCs for CVE-2024-50603
#POC DescriptionSource LinkShenlong Link
1CVE-2024-50603-nuclei-pochttps://github.com/newlinesec/CVE-2024-50603POC Details
2CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injectionhttps://github.com/th3gokul/CVE-2024-50603POC Details
3An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-50603.yamlPOC Details
4Aviatrix Controller Unauthenticated OS Command Injectionhttps://github.com/h0w1tzxr/CVE-2024-50603POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-50603
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-50603

No comments yet


Leave a comment