diff --git a/advisories/unreviewed/2024/12/GHSA-5qww-56gc-f66c/GHSA-5qww-56gc-f66c.json b/advisories/unreviewed/2024/12/GHSA-5qww-56gc-f66c/GHSA-5qww-56gc-f66c.json index e133fbca3d5fe..c32f8a3d81331 100644 --- a/advisories/unreviewed/2024/12/GHSA-5qww-56gc-f66c/GHSA-5qww-56gc-f66c.json +++ b/advisories/unreviewed/2024/12/GHSA-5qww-56gc-f66c/GHSA-5qww-56gc-f66c.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-5qww-56gc-f66c", - "modified": "2024-12-20T18:31:30Z", + "modified": "2024-12-20T18:31:36Z", "published": "2024-12-20T18:31:30Z", "aliases": [ "CVE-2024-28892" ], + "summary": "GoCast Unauthorized RCE", "details": "An OS command injection vulnerability exists in the name parameter of GoCast 1.1.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.", "severity": [ { @@ -13,12 +14,36 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "https://github.com/mayuresh82/gocast" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "1.1.3" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28892" }, + { + "type": "PACKAGE", + "url": "https://github.com/mayuresh82/gocast" + }, { "type": "WEB", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960"