Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2640 | SequenceServer lets you rapidly set up a BLAST+ server with an intuitive user interface for personal or group use. Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands. This vulnerability has been fixed in 3.1.2. |
Github GHSA |
GHSA-qv32-5wm2-p32h | Command Injection in sequenceserver |
Fri, 16 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wurmlab:sequenceserver:*:*:*:*:*:ruby:*:* |
Thu, 15 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wurmlab
Wurmlab sequenceserver |
|
| CPEs | cpe:2.3:a:wurmlab:sequenceserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wurmlab
Wurmlab sequenceserver |
|
| Metrics |
ssvc
|
Wed, 14 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SequenceServer lets you rapidly set up a BLAST+ server with an intuitive user interface for personal or group use. Several HTTP endpoints did not properly sanitize user input and/or query parameters. This could be exploited to inject and run unwanted shell commands. This vulnerability has been fixed in 3.1.2. | |
| Title | Command Injection in sequenceserver | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-15T15:05:31.961Z
Reserved: 2024-07-30T14:01:33.922Z
Link: CVE-2024-42360
Updated: 2024-08-15T15:05:16.838Z
Status : Analyzed
Published: 2024-08-14T20:15:12.533
Modified: 2024-08-16T20:00:10.467
Link: CVE-2024-42360
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA