CVE-2024-25626 (GCVE-0-2024-25626)

Vulnerability from cvelistv5 – Published: 2024-02-19 19:31 – Updated: 2024-08-28 16:34
VLAI?
Summary
Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. In Yocto Projects Bitbake before 2.6.2 (before and included Yocto Project 4.3.1), with the Toaster server (included in bitbake) running, missing input validation allows an attacker to perform a remote code execution in the server's shell via a crafted HTTP request. Authentication is not necessary. Toaster server execution has to be specifically run and is not the default for Bitbake command line builds, it is only used for the Toaster web based user interface to Bitbake. The fix has been backported to the bitbake included with Yocto Project 5.0, 3.1.31, 4.0.16, and 4.3.2.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
Vendor Product Version
yoctoproject poky Affected: >= 4.3.0, < 4.3.2
Affected: >= 4.0.0, < 4.0.16
Affected: < 3.1.31
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.817Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:yocto_project:yoctoproject:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "yoctoproject",
            "vendor": "yocto_project",
            "versions": [
              {
                "lessThan": "4.3.2",
                "status": "affected",
                "version": "4.3.0",
                "versionType": "custom"
              },
              {
                "lessThan": "4.0.16",
                "status": "affected",
                "version": "4.0.0",
                "versionType": "custom"
              },
              {
                "lessThan": "3.1.31",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25626",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T16:44:06.901164Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T16:34:04.491Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "poky",
          "vendor": "yoctoproject",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 4.3.0, \u003c 4.3.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.0.0, \u003c 4.0.16"
            },
            {
              "status": "affected",
              "version": "\u003c 3.1.31"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. In Yocto Projects Bitbake before 2.6.2 (before and included Yocto Project 4.3.1), with the Toaster server (included in bitbake) running, missing input validation allows an attacker to perform a remote code execution in the server\u0027s shell via a crafted HTTP request. Authentication is not necessary. Toaster server execution has to be specifically run and is not the default for Bitbake command line builds, it is only used for the Toaster web based user interface to Bitbake. The fix has been backported to the bitbake included with Yocto Project 5.0, 3.1.31, 4.0.16, and 4.3.2."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-19T19:31:37.398Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4"
        }
      ],
      "source": {
        "advisory": "GHSA-75xw-78mm-72r4",
        "discovery": "UNKNOWN"
      },
      "title": "Yocto Project Security Advisory - BitBake/Toaster"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-25626",
    "datePublished": "2024-02-19T19:31:37.398Z",
    "dateReserved": "2024-02-08T22:26:33.511Z",
    "dateUpdated": "2024-08-28T16:34:04.491Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. In Yocto Projects Bitbake before 2.6.2 (before and included Yocto Project 4.3.1), with the Toaster server (included in bitbake) running, missing input validation allows an attacker to perform a remote code execution in the server\u0027s shell via a crafted HTTP request. Authentication is not necessary. Toaster server execution has to be specifically run and is not the default for Bitbake command line builds, it is only used for the Toaster web based user interface to Bitbake. The fix has been backported to the bitbake included with Yocto Project 5.0, 3.1.31, 4.0.16, and 4.3.2.\"}, {\"lang\": \"es\", \"value\": \"Yocto Project es un proyecto de colaboraci\\u00f3n de c\\u00f3digo abierto que ayuda a los desarrolladores a crear sistemas personalizados basados en Linux independientemente de la arquitectura del hardware. En Yocto Projects Bitbake anterior a 2.6.2 (anterior e incluido Yocto Project 4.3.1), con el servidor Toaster (incluido en bitbake) ejecut\\u00e1ndose, la validaci\\u00f3n de entrada faltante permite a un atacante realizar una ejecuci\\u00f3n remota de c\\u00f3digo en el shell del servidor a trav\\u00e9s de un HTTP manipulado pedido. La autenticaci\\u00f3n no es necesaria. La ejecuci\\u00f3n del servidor Toaster debe ejecutarse espec\\u00edficamente y no es la opci\\u00f3n predeterminada para las compilaciones de la l\\u00ednea de comandos de Bitbake; solo se usa para la interfaz de usuario basada en web de Toaster para Bitbake. La soluci\\u00f3n se ha compatible con el bitbake incluido en Yocto Project 5.0, 3.1.31, 4.0.16 y 4.3.2.\"}]",
      "id": "CVE-2024-25626",
      "lastModified": "2024-11-21T09:01:06.513",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
      "published": "2024-02-19T20:15:45.513",
      "references": "[{\"url\": \"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-25626\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-02-19T20:15:45.513\",\"lastModified\":\"2025-02-03T19:52:09.697\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. In Yocto Projects Bitbake before 2.6.2 (before and included Yocto Project 4.3.1), with the Toaster server (included in bitbake) running, missing input validation allows an attacker to perform a remote code execution in the server\u0027s shell via a crafted HTTP request. Authentication is not necessary. Toaster server execution has to be specifically run and is not the default for Bitbake command line builds, it is only used for the Toaster web based user interface to Bitbake. The fix has been backported to the bitbake included with Yocto Project 5.0, 3.1.31, 4.0.16, and 4.3.2.\"},{\"lang\":\"es\",\"value\":\"Yocto Project es un proyecto de colaboraci\u00f3n de c\u00f3digo abierto que ayuda a los desarrolladores a crear sistemas personalizados basados en Linux independientemente de la arquitectura del hardware. En Yocto Projects Bitbake anterior a 2.6.2 (anterior e incluido Yocto Project 4.3.1), con el servidor Toaster (incluido en bitbake) ejecut\u00e1ndose, la validaci\u00f3n de entrada faltante permite a un atacante realizar una ejecuci\u00f3n remota de c\u00f3digo en el shell del servidor a trav\u00e9s de un HTTP manipulado pedido. La autenticaci\u00f3n no es necesaria. La ejecuci\u00f3n del servidor Toaster debe ejecutarse espec\u00edficamente y no es la opci\u00f3n predeterminada para las compilaciones de la l\u00ednea de comandos de Bitbake; solo se usa para la interfaz de usuario basada en web de Toaster para Bitbake. La soluci\u00f3n se ha compatible con el bitbake incluido en Yocto Project 5.0, 3.1.31, 4.0.16 y 4.3.2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1.31\",\"matchCriteriaId\":\"8EEAECFB-040F-409E-BAFD-74B01E44A6BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2\",\"versionEndExcluding\":\"4.0.16\",\"matchCriteriaId\":\"1712F1FD-5E2E-42F3-9521-AB8E885A0B33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"versionEndExcluding\":\"4.3.2\",\"matchCriteriaId\":\"E2DCF356-700E-4B34-A33F-6B9489C7CCF1\"}]}]}],\"references\":[{\"url\":\"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\", \"name\": \"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:44:09.817Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-25626\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-20T16:44:06.901164Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:yocto_project:yoctoproject:*:*:*:*:*:*:*:*\"], \"vendor\": \"yocto_project\", \"product\": \"yoctoproject\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.3.0\", \"lessThan\": \"4.3.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.0.0\", \"lessThan\": \"4.0.16\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"3.1.31\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-28T16:33:52.848Z\"}}], \"cna\": {\"title\": \"Yocto Project Security Advisory - BitBake/Toaster\", \"source\": {\"advisory\": \"GHSA-75xw-78mm-72r4\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"yoctoproject\", \"product\": \"poky\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 4.3.0, \u003c 4.3.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 4.0.0, \u003c 4.0.16\"}, {\"status\": \"affected\", \"version\": \"\u003c 3.1.31\"}]}], \"references\": [{\"url\": \"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\", \"name\": \"https://github.com/yoctoproject/poky/security/advisories/GHSA-75xw-78mm-72r4\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Yocto Project is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. In Yocto Projects Bitbake before 2.6.2 (before and included Yocto Project 4.3.1), with the Toaster server (included in bitbake) running, missing input validation allows an attacker to perform a remote code execution in the server\u0027s shell via a crafted HTTP request. Authentication is not necessary. Toaster server execution has to be specifically run and is not the default for Bitbake command line builds, it is only used for the Toaster web based user interface to Bitbake. The fix has been backported to the bitbake included with Yocto Project 5.0, 3.1.31, 4.0.16, and 4.3.2.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-02-19T19:31:37.398Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-25626\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-28T16:34:04.491Z\", \"dateReserved\": \"2024-02-08T22:26:33.511Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-02-19T19:31:37.398Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…