CVE-2023-37469: CasaOS Command Injection vulnerability
CasaOS is an open-source personal cloud system. Prior to version 0.4.4, if an authenticated user using CasaOS is able to successfully connect to a controlled SMB server, they are able to execute arbitrary commands. Version 0.4.4 contains a patch for the issue.
References
- github.com/IceWhaleTech/CasaOS
- github.com/IceWhaleTech/CasaOS/blob/96e92842357230098c771bc41fd3baf46189b859/route/v1/samba.go
- github.com/IceWhaleTech/CasaOS/blob/96e92842357230098c771bc41fd3baf46189b859/service/connections.go
- github.com/IceWhaleTech/CasaOS/commit/af440eac5563644854ff33f72041e52d3fd1f47c
- github.com/IceWhaleTech/CasaOS/releases/tag/v0.4.4
- github.com/advisories/GHSA-92vc-4fcw-g68q
- github.com/github/pe-security-lab/issues/1871
- nvd.nist.gov/vuln/detail/CVE-2023-37469
- securitylab.github.com/advisories/GHSL-2022-119_CasaOS
Detect and mitigate CVE-2023-37469 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →