CVE-2023-43364: Searchor CLI's Search vulnerable to Arbitrary Code using Eval
(updated )
An issue in Arjun Sharda’s Searchor before version v.2.4.2 allows an attacker to execute arbitrary code via a crafted script to the eval() function in Searchor’s src/searchor/main.py file, affecting the search feature in Searchor’s CLI (Command Line Interface).
References
- github.com/ArjunSharda/Searchor
- github.com/ArjunSharda/Searchor/commit/16016506f7bf92b0f21f51841d599126d6fcd15b
- github.com/ArjunSharda/Searchor/pull/130
- github.com/ArjunSharda/Searchor/security/advisories/GHSA-66m2-493m-crh2
- github.com/advisories/GHSA-66m2-493m-crh2
- github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-
- github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
- github.com/pypa/advisory-database/tree/main/vulns/searchor/PYSEC-2023-262.yaml
- nvd.nist.gov/vuln/detail/CVE-2023-43364
Detect and mitigate CVE-2023-43364 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →