CVE-2024-13129

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-13129
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-13129.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-13129
Published
2025-01-03T22:15:06Z
Modified
2025-05-28T10:37:54.249842Z
Summary
[none]
Details

A vulnerability was found in Roxy-WI up to 8.1.3. It has been declared as critical. Affected by this vulnerability is the function action_service of the file app/modules/roxywi/roxy.py. The manipulation of the argument action/service leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 8.1.4 is able to address this issue. The identifier of the patch is 32313928eb9ce906887b8a30bf7b9a3d5c0de1be. It is recommended to upgrade the affected component.

References

Affected packages

Git / github.com/roxy-wi/roxy-wi

Affected ranges

Type
GIT
Repo
https://github.com/roxy-wi/roxy-wi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

3.*

3.4.4.6
3.4.4.7
3.4.5
3.4.5.1

v.*

v.5.3.5.0

v1.*

v1.0
v1.1
v1.10
v1.10.1
v1.10.2
v1.10.2.1
v1.3
v1.4
v1.4.1
v1.6
v1.9.1

v2.*

v2.0.2

v3.*

v3.2.13
v3.3

v4.*

v4.4.1.0

v5.*

v5.1.1.0
v5.1.4.0
v5.2.0
v5.2.1
v5.2.2.0
v5.2.3.0
v5.2.4.0
v5.2.5.0
v5.2.6.0
v5.3.0.0
v5.3.1.0
v5.3.2.0
v5.3.3.0
v5.3.4.0
v5.3.6.0
v5.4.0.0
v5.4.1.0
v5.4.2.0
v5.4.3.0
v5.5.0.0
v5.5.1.0

v6.*

v6.0.0.0
v6.0.1.0
v6.0.2.0
v6.0.3.0
v6.1.0.0
v6.1.1.0
v6.1.2.0
v6.1.3.0
v6.1.4.0
v6.1.5.0
v6.2.0.0
v6.2.1.0
v6.2.2.0
v6.2.3.0
v6.3.0.0
v6.3.1.0
v6.3.10.0
v6.3.11.0
v6.3.12.0
v6.3.13.0
v6.3.14.0
v6.3.15.0
v6.3.16.0
v6.3.17.0
v6.3.18.0
v6.3.19.0
v6.3.2.0
v6.3.3.0
v6.3.4.0
v6.3.5.0
v6.3.6.0
v6.3.7.0
v6.3.8.0
v6.3.9.0

v7.*

v7.0.0.0
v7.0.1.0
v7.0.2.0
v7.0.3.0
v7.0.4.0
v7.1.0.0
v7.1.1.0
v7.1.2.0
v7.2.0.0
v7.2.1.0
v7.2.2.0
v7.2.3.0
v7.2.4.0
v7.2.5.0
v7.2.6.0
v7.3.0.0
v7.3.1.0
v7.3.2.0

v8.*

v8.0
v8.0.1
v8.0.2
v8.1
v8.1.0.1
v8.1.1
v8.1.2
v8.1.3