|
|||
Rule General Information |
---|
Release Date: | 2024-09-24 | |
Rule Name: | Changedetection Remote Code Execution Vulnerability (CVE-2024-32651) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced). | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://github.com/dgtlmoon/changedetection.io/releases/tag/0.45.21 https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3 https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2 |
|
Solutions |
---|
Refer to the announcement or patch by the vendor: https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3 |