GHSA-738q-mc72-2q22

Suggest an improvement
Source
https://github.com/advisories/GHSA-738q-mc72-2q22
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-738q-mc72-2q22/GHSA-738q-mc72-2q22.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-738q-mc72-2q22
Aliases
Published
2023-10-10T21:31:12Z
Modified
2023-11-08T04:13:38.123322Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
MTProto proxy remote code execution vulnerability
Details

In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.

Database specific
{
    "nvd_published_at": "2023-10-10T21:15:09Z",
    "cwe_ids": [
        "CWE-1188",
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-10-10T22:28:03Z"
}
References

Affected packages

Hex / mtproto_proxy

Package

Name
mtproto_proxy
Purl
pkg:hex/mtproto_proxy

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.7.2