Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[GHSA-7r88-wjhj-jr8m] RaspAP Command Injection vulnerability #2984

Conversation

MarkLee131
Copy link

@MarkLee131 MarkLee131 commented Nov 23, 2023

Updates

  • Affected products
  • References

Comments
Add patch commit for v2.8.8: RaspAP/raspap-webgui@1fabc48,
belongs to pr: RaspAP/raspap-webgui#1303

they are mentioned in release note v2.8.8: "Security: Sanitize post data w/ escapeshellcmd() by @billz in #1303 thanks @buglloc"

@github-actions github-actions bot changed the base branch from main to MarkLee131/advisory-improvement-2984 November 23, 2023 12:38
@buglloc
Copy link

buglloc commented Nov 23, 2023

I think these vulnerabilities are unrelated, just similar.
GHSA-7r88-wjhj-jr8m related to CVE-2022-39987 and, as far as I known, it is fixed in v2.9.5:

In RaspAP/raspap-webgui#1303 which you mention fixed another but similar vulnerability. it allows an unauthenticated attacker to execute arbitrary OS commands

@MarkLee131
Copy link
Author

Hi,@buglloc. Thanks for the correction. I made the mistake. I will correct the info and open a new PR for this CVE.

Besides, the patch commit I mentioned above seems like the fix for GHSA-7c28-wg7r-pg6f, which "allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php". is it correct?

@MarkLee131 MarkLee131 closed this Nov 23, 2023
@github-actions github-actions bot deleted the MarkLee131-GHSA-7r88-wjhj-jr8m branch November 23, 2023 15:52
@buglloc
Copy link

buglloc commented Nov 23, 2023

Besides, the patch commit I mentioned above seems like the fix for GHSA-7c28-wg7r-pg6f, which "allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php". is it correct?

Yeah, looks correct! :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants