-
Notifications
You must be signed in to change notification settings - Fork 583
Expand file tree
/
Copy pathGHSA-h3x5-r9c2-qm47.json
More file actions
49 lines (49 loc) · 1.73 KB
/
GHSA-h3x5-r9c2-qm47.json
File metadata and controls
49 lines (49 loc) · 1.73 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
{
"schema_version": "1.4.0",
"id": "GHSA-h3x5-r9c2-qm47",
"modified": "2026-04-20T00:00:00Z",
"published": "2026-04-20T00:00:00Z",
"aliases": [],
"summary": "hexstrike-ai: Unauthenticated Remote Code Execution via /api/command endpoint",
"details": "hexstrike-ai contains a critical vulnerability in its Flask REST API server (hexstrike_server.py). The /api/command endpoint accepts arbitrary shell commands via a JSON POST request and executes them using subprocess.Popen() with shell=True. No authentication or authorization is required.\n\nAn attacker can achieve full Remote Code Execution on the server by sending a simple HTTP request:\n\n```\ncurl -X POST http://<host>:5000/api/command -H \"Content-Type: application/json\" -d '{\"command\":\"id\"}'\n```\n\nThe vulnerable code at line 6868:\n```python\nprocess = subprocess.Popen(command, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE)\n```\n\nRoot cause: Direct execution of user-supplied input via shell=True with zero authentication (CWE-78, CWE-306).",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "hexstrike-ai"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
}
]
}
]
}
],
"references": [
{
"type": "WEB",
"url": "https://github.com/0x4m4/hexstrike-ai"
}
],
"database_specific": {
"cwe_ids": [
"CWE-78",
"CWE-306"
],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}