CVE-2024-50603
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
4Description
An issue was discovered in Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996. Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to execute arbitrary code. Shell metacharacters can be sent to /v1/api in cloud_type for list_flightpath_destination_instances, or src_cloud_type for flightpath_connection_test.
Analysis
Aviatrix Controller before 7.1.4191 and 7.2.x before 7.2.4996 contains an OS command injection via improper neutralization of special elements in the /v1/api endpoint, allowing unauthenticated remote code execution.
Technical Context
The CWE-78 command injection in the list_flightpath_destination_instances and src_cloud_type parameters of /v1/api fails to sanitize shell metacharacters. Attackers inject OS commands that execute with the privileges of the Aviatrix Controller process.
Affected Products
['Aviatrix Controller before 7.1.4191', 'Aviatrix Controller 7.2.x before 7.2.4996']
Remediation
Update Aviatrix Controller immediately. Rotate all cloud API credentials accessible from the controller. Review cloud network configurations for unauthorized modifications. Restrict controller management interface access.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today