CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
An issue in tiagorlampert CHAOS v5.0.1 allows a remote attacker to execute arbitrary code via the BuildClient function within client_service.go
Vendor | Product | Version | CPE |
---|---|---|---|
tiagorlampert | chaos | * | cpe:2.3:a:tiagorlampert:chaos:*:*:*:*:*:*:*:* |
blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents
gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496
github.com/advisories/GHSA-p3j6-f45h-hw5f
github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b
github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e
github.com/tiagorlampert/CHAOS/pull/95
nvd.nist.gov/vuln/detail/CVE-2024-30850
nvd.nist.gov/vuln/detail/CVE-2024-33434