Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-32022 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Command Injection in `basic_option_gui.py`. <br>πŸ’₯ **Consequences**: Attackers can execute arbitrary OS commands. High impact on Confidentiality & Integrity (CVSS H), but Availability is N.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-77 (Command Injection). <br>πŸ” **Flaw**: Unsafe handling of user input in the GUI script, allowing shell command execution.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Kohya_ss by bmaltais. <br>πŸ“¦ **Versions**: v22.6.1 through v23.1.3. <br>⚠️ **Component**: `basic_option_gui.py`.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hacker Actions**: Execute system commands. <br>πŸ“‚ **Impact**: Full Control over Confidentiality (C:H) and Integrity (I:H). Can steal data or modify files.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Low. <br>πŸ“Š **CVSS**: AV:N (Network), AC:L (Low Complexity), PR:N (No Privs), UI:N (No User Interaction). <br>βœ… **Easy to exploit remotely without auth.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exp**: Yes. <br>πŸ”— **PoC**: Available via CodeQL workshop by Sylwia Budzynska. <br>πŸ§ͺ **Proof**: GitHub repository demonstrates finding the vulnerability.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `basic_option_gui.py` in Kohya_ss repos. <br>πŸ“‹ **Verify**: Check version is between 22.6.1 and 23.1.3. <br>πŸ› οΈ **Tool**: Use CodeQL to detect command injection patterns.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fixed**: Yes. <br>πŸ“… **Date**: Published 2024-04-16. <br>πŸ”— **Patch**: Commit `831af8babeb75faff62bcc6a8c6a4f80354f1ff1` addresses the issue. GHSA advisory exists.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Upgrade immediately. <br>πŸ›‘ **Mitigation**: Disable the GUI component if possible. <br>🚫 **Restrict**: Do not expose Kohya_ss to untrusted networks.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. <br>⚑ **Priority**: Patch now. <br>πŸ“‰ **Risk**: Remote Code Execution (RCE) with no auth required. Critical security hygiene.