Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1jNXJ2LWhqamMtanY3bc4AA68X
tiagorlampert CHAOS vulnerable to Cross Site Scripting
Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.
Permalink: https://github.com/advisories/GHSA-c5rv-hjjc-jv7mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jNXJ2LWhqamMtanY3bc4AA68X
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 7 months ago
Updated: 7 months ago
CVSS Score: 4.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-c5rv-hjjc-jv7m, CVE-2024-31839
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-31839
- https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents
- https://github.com/tiagorlampert/CHAOS
- https://github.com/advisories/GHSA-c5rv-hjjc-jv7m
Blast Radius: 1.0
Affected Packages
go:github.com/tiagorlampert/CHAOS
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: <= 5.0.1
No known fixed version
All affected versions: