Vulnerability Description
In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to the add_server, build_config, and construct_command_line functions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shadowsocks | Shadowsocks-Libev | 1.3 |
| Debian | Debian Linux | 9.2 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2017/10/13/2Mailing ListThird Party Advisory
- http://www.debian.org/security/2017/dsa-4009Third Party Advisory
- https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06Third Party Advisory
- https://github.com/shadowsocks/shadowsocks-libev/issues/1734Third Party Advisory
- https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/ExploitThird Party Advisory
- http://openwall.com/lists/oss-security/2017/10/13/2Mailing ListThird Party Advisory
- http://www.debian.org/security/2017/dsa-4009Third Party Advisory
- https://github.com/shadowsocks/shadowsocks-libev/commit/c67d275803dc6ea22c558d06Third Party Advisory
- https://github.com/shadowsocks/shadowsocks-libev/issues/1734Third Party Advisory
- https://www.x41-dsec.de/lab/advisories/x41-2017-010-shadowsocks-libev/ExploitThird Party Advisory
FAQ
What is CVE-2017-15924?
CVE-2017-15924 is a vulnerability with a CVSS score of 7.8 (HIGH). In manager.c in ss-manager in shadowsocks-libev 3.1.0, improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic, related to...
How severe is CVE-2017-15924?
CVE-2017-15924 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15924?
Check the references section above for vendor advisories and patch information. Affected products include: Shadowsocks Shadowsocks-Libev, Debian Debian Linux.