Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:web2py:web2py:*:*:*:*:*:*:*:*", "matchCriteriaId": "804767C1-58E1-4770-88B5-08E840011736", "versionEndIncluding": "2.24.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An OS command injection vulnerability exists in web2py 2.24.1 and earlier. When the product is configured to use notifySendHandler for logging (not the default configuration), a crafted web request may execute an arbitrary OS command on the web server using the product."}, {"lang": "es", "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos del Sistema Operativo en web2py 2.24.1 y versiones anteriores. Cuando el producto est\u00e1 configurado para utilizar notifySendHandler para el registro (no la configuraci\u00f3n predeterminada), una solicitud web manipulada puede ejecutar un comando arbitrario del sistema operativo en el servidor web que utiliza el producto."}], "id": "CVE-2023-45158", "lastModified": "2024-11-21T08:26:27.417", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-10-16T08:15:09.990", "references": [{"source": "vultures@jpcert.or.jp", "tags": ["Product"], "url": "http://web2py.com/"}, {"source": "vultures@jpcert.or.jp", "tags": ["Product"], "url": "http://web2py.com/init/default/download"}, {"source": "vultures@jpcert.or.jp", "tags": ["Patch"], "url": "https://github.com/web2py/web2py/commit/936e2260b0c34c44e2f3674a893e96d2a7fad0a3"}, {"source": "vultures@jpcert.or.jp", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/jp/JVN80476432/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "http://web2py.com/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product"], "url": "http://web2py.com/init/default/download"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "https://github.com/web2py/web2py/commit/936e2260b0c34c44e2f3674a893e96d2a7fad0a3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://jvn.jp/en/jp/JVN80476432/"}], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}