Description
OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
Published: 2024-06-11
Score: 9.8 Critical
EPSS: 2.5% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-36029 OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.
History

Fri, 14 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Keisuke Nakayama
Keisuke Nakayama awkblog
Weaknesses CWE-78
CPEs cpe:2.3:a:keisuke_nakayama:awkblog:*:*:*:*:*:*:*:*
Vendors & Products Keisuke Nakayama
Keisuke Nakayama awkblog
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Keisuke Nakayama Awkblog
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-03-14T14:43:00.422Z

Reserved: 2024-05-24T02:04:55.207Z

Link: CVE-2024-36360

cve-icon Vulnrichment

Updated: 2024-08-02T03:37:04.935Z

cve-icon NVD

Status : Deferred

Published: 2024-06-11T05:15:53.610

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-36360

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses