Headline
GHSA-xfjj-f699-rc79: tiagorlampert CHAOS vulnerable to arbitrary code execution
An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the filename
argument into the buildStr
string without any sanitization or filtering.
Skip to content
Navigation Menu
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2024-33434
tiagorlampert CHAOS vulnerable to arbitrary code execution
Moderate severity GitHub Reviewed Published May 7, 2024 to the GitHub Advisory Database • Updated May 7, 2024
Package
gomod github.com/tiagorlampert/CHAOS (Go)
Affected versions
< 0.0.0-20220716
Patched versions
0.0.0-20220716
Description
Published to the GitHub Advisory Database
May 7, 2024