CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-47611

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00144/1

CVE-2024-47611: A command line argument injection vulnerability exists in XZ Utils versions 5.6.2 and older when built for native Windows. This flaw arises because Unicode characters in command lines are converted to similar-looking ASCII characters via best-fit mapping, potentially altering command meaning. This can be exploited using malicious filenames to execute argument injection or directory traversal attacks. While this issue is resolved in version 5.6.3, systems running vulnerable versions are at risk. Despite a low CVSS score, the "In The Wild" tag emphasizes potential active exploitation. The SOCRadar Vulnerability Risk Score (SVRS) of 30 indicates a moderate risk, suggesting that while not critical, the vulnerability should be monitored and patched promptly to mitigate potential security breaches, especially given the "In The Wild" tag. This highlights the importance of timely updates and careful handling of filenames containing Unicode characters.

In The Wild
2024-10-02

2024-10-04

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-47611 | tukaani-project xz up to 5.6.2 argument injection
vuldb.com2024-10-05
CVE-2024-47611 | tukaani-project xz up to 5.6.2 argument injection | A vulnerability was found in tukaani-project xz up to 5.6.2 and classified as critical. This issue affects some unknown processing. The manipulation leads to argument injection. The identification of this vulnerability is CVE-2024-47611. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component.
cve-2024-47611
domains
urls
cves

Social Media

CVE-2024-47611 Command Injection in XZ Utils on Windows Versions Below 5.6.3 XZ Utils offer a data-compression library and command-line tools. In versions 5.6.2 and older, there is a command line argument injecti... https://t.co/Z5B6duGmtS
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://github.com/tukaani-project/xz/commit/bf518b9ba446327a062ddfe67e7e0a5baed2394f
[email protected]https://github.com/tukaani-project/xz/security/advisories/GHSA-m538-c5qw-3cg4

CWE Details

CWE IDCWE NameDescription
CWE-176Improper Handling of Unicode EncodingThe software does not properly handle when an input contains Unicode encoding.
CWE-88Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence