Lucene search

K
githubGitHub Advisory DatabaseGHSA-M8R5-7WF4-63MW
HistoryDec 05, 2022 - 6:30 a.m.

Nadesiko3 OS Command Injection vulnerability

2022-12-0506:30:22
CWE-78
GitHub Advisory Database
github.com
11
nadesiko3
pc version
command injection
vulnerability
remote attack
compression
decompression
patch
jpcert/cc
advisory

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

77.8%

OS command injection vulnerability in Nadesiko3 (PC Version) v3.3.68 and earlier allows a remote attacker to execute an arbitrary OS command when processing compression and decompression on the product.

Release notes for versions 3.3.62 and 3.3.69 both link to patches for this particular issue. The JPCERT/CC advisory lists versions 3.3.68 and prior as vulnerable, and the most recent patch for this issue is tagged with version 3.3.69.

Affected configurations

Vulners
Node
kujirahandnadesiko3Range3.3.68
VendorProductVersionCPE
kujirahandnadesiko3*cpe:2.3:a:kujirahand:nadesiko3:*:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.005

Percentile

77.8%

Related for GHSA-M8R5-7WF4-63MW