CVE-2024-43799
Send_project
CVE-2024-43799 is a critical vulnerability in the Send library that allows for potential untrusted code execution. This vulnerability arises because Send passes untrusted user input to SendStream.redirect(), leading to the execution of malicious code. The vulnerability is patched in send version 0.19.0.
Although CVE-2024-43799 has a CVSS score of 4.7, indicating a medium severity, the SOCRadar Vulnerability Risk Score (SVRS) is 48. This suggests a moderate risk, however organizations utilizing the Send library should still apply the patch to prevent potential exploitation. Exploitation could result in unauthorized access and potentially complete system compromise by threat actors. The vulnerability is due to improper handling of user input within the redirect function.
Description
CVE-2024-43799 is a vulnerability in the Send library, which is used for streaming files from the file system as an HTTP response. The vulnerability allows untrusted user input to be passed to SendStream.redirect(), which can lead to the execution of untrusted code. This vulnerability has a CVSS score of 5, indicating a medium severity level. However, the SOCRadar Vulnerability Risk Score (SVRS) is 38, indicating a higher level of risk. This is because the SVRS takes into account additional factors, such as social media activity, news reports, and associations with threat actors and malware.
Key Insights
- The vulnerability can be exploited by attackers to execute arbitrary code on vulnerable systems.
- The vulnerability is relatively easy to exploit, as it only requires an attacker to send a specially crafted HTTP request to a vulnerable system.
- The vulnerability is actively being exploited by attackers in the wild.
- The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about the vulnerability, calling for immediate and necessary measures to be taken.
Mitigation Strategies
- Update to the latest version of the Send library (0.19.0 or later).
- Restrict access to the vulnerable code from untrusted sources.
- Implement input validation to prevent untrusted user input from being passed to SendStream.redirect().
- Monitor for suspicious activity and take appropriate action if necessary.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.