CVE-2024-52010

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-52010
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52010.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-52010
Aliases
Related
Published
2024-11-12T17:15:10Z
Modified
2024-11-19T17:42:36.463369Z
Summary
[none]
Details

Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. A command injection vulnerability in the Web SSH feature allows an authenticated attacker to execute arbitrary commands as root on the host. Zoraxy has a Web SSH terminal feature that allows authenticated users to connect to SSH servers from their browsers. In HandleCreateProxySession the request to create an SSH session is handled. An attacker can exploit the username variable to escape from the bash command and inject arbitrary commands into sshCommand. This is possible, because, unlike hostname and port, the username is not validated or sanitized.

References

Affected packages

Git / github.com/tobychui/zoraxy

Affected ranges

Type
GIT
Repo
https://github.com/tobychui/zoraxy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

2.*

2.1
2.2
2.3
2.4
2.5
2.6
2.6.2
2.6.3
2.6.4
2.6.5
2.6.6
2.6.7
2.6.8

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.0.6
3.0.7
3.0.8
3.0.9
3.1.0
3.1.1
3.1.1r2

v3.*

v3.1.1r3
v3.1.2