GHSA-vj95-2f9q-x7h6

Suggest an improvement
Source
https://github.com/advisories/GHSA-vj95-2f9q-x7h6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vj95-2f9q-x7h6/GHSA-vj95-2f9q-x7h6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vj95-2f9q-x7h6
Aliases
  • CVE-2018-15747
Published
2022-05-24T16:48:34Z
Modified
2023-11-08T03:59:57.981141Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
glot-code-runner RCE
Details

The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.

Database specific
{
    "nvd_published_at": "2019-06-21T14:15:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "github_reviewed_at": "2023-07-19T23:40:28Z",
    "severity": "CRITICAL",
    "github_reviewed": true
}
References

Affected packages

Go / github.com/prasmussen/glot-code-runner

Package

Name
github.com/prasmussen/glot-code-runner
View open source insights on deps.dev
Purl
pkg:golang/github.com/prasmussen/glot-code-runner

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2018-05-19

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vj95-2f9q-x7h6/GHSA-vj95-2f9q-x7h6.json"