vendor:
Shadowsocks-libev
by:
X41 D-Sec GmbH, Niklas Abel
7,5
CVSS
HIGH
Command Execution
N/A
CWE
Product Name: Shadowsocks-libev
Affected Version From: 3.1.0
Affected Version To: N/A
Patch Exists: N/A
Related CWE: not yet assigned
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2017
Command Execution in Shadowsocks-libev
Shadowsocks-libev offers local command execution per configuration file or/and additionally, code execution per UDP request on 127.0.0.1. The configuration file on the file system or the JSON configuration received via UDP request is parsed and the arguments are passed to the 'add_server' function. The function calls 'construct_command_line(manager, server);' which returns a string from the parsed configuration. The string gets executed at line 486 'if (system(cmd) == -1) {', so if a configuration parameter contains '||evil command&&' within the 'method' parameter, the evil command will get executed.
Mitigation:
Authentication can be set with the '-k' parameter.