CVE-2023-37265

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-37265
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-37265.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-37265
Aliases
Published
2023-07-17T21:15:09Z
Modified
2024-08-20T20:59:01.173377Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as root on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in 391dd7f. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.

References

Affected packages

Git / github.com/icewhaletech/casaos-gateway

Affected ranges

Type
GIT
Repo
https://github.com/icewhaletech/casaos-gateway
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.3.5-alpha3
v0.3.5-alpha4
v0.3.5-alpha5
v0.3.5-alpha6
v0.3.5-alpha7
v0.3.6
v0.3.6-alpha1
v0.3.6-alpha2
v0.3.6-alpha3
v0.3.6-alpha4
v0.3.6-alpha5
v0.3.6-alpha6
v0.3.6-alpha7
v0.3.8
v0.4.0
v0.4.0-alpha1
v0.4.1
v0.4.1-alpha1
v0.4.1-alpha2
v0.4.1-alpha3
v0.4.2
v0.4.2-alpha1
v0.4.4-alpha1