Summary
Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server.
It seems that when running goshs without arguments it is possible for anyone to execute commands on the server. I tested this vulnerability only on version 1.0.4 of goshs. I saw that the command function appeared on version 0.3.4.
Details
Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer.
It seems that the function dispatchReadPump
does not checks the option cli -c
, thus allowing anyone to execute arbitrary command through the use of websockets.
PoC
Complete instructions, including specific configuration details, to reproduce the vulnerability.
I used websocat for the POC:
echo -e '{"type": "command", "content": "id"}' |./websocat 'ws://192.168.1.11:8000/?ws' -t
Impact
What kind of vulnerability is it? Who is impacted?
The vulnerability will only impacts goshs server on vulnerable versions.
Summary
Short summary of the problem. Make the impact and severity as clear as possible. For example: An unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server.
It seems that when running goshs without arguments it is possible for anyone to execute commands on the server. I tested this vulnerability only on version 1.0.4 of goshs. I saw that the command function appeared on version 0.3.4.
Details
Give all details on the vulnerability. Pointing to the incriminated source code is very helpful for the maintainer.
It seems that the function
dispatchReadPump
does not checks the option cli-c
, thus allowing anyone to execute arbitrary command through the use of websockets.PoC
Complete instructions, including specific configuration details, to reproduce the vulnerability.
I used websocat for the POC:
Impact
What kind of vulnerability is it? Who is impacted?
The vulnerability will only impacts goshs server on vulnerable versions.