This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Arbitrary Command Execution in Bert-VITS2 v2.3. π₯ **Consequences**: Attackers can run malicious system commands, leading to total server compromise, data theft, or service disruption.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-78 (OS Command Injection). The flaw lies in `webui_preprocess.py`, where user inputs are likely passed directly to system shells without proper sanitization.
Q3Who is affected? (Versions/Components)
π₯ **Affected**: Users running **Bert-VITS2 version 2.3**. Specifically, the FishAudio open-source TTS model backbone. Check your local installation version.
Q4What can hackers do? (Privileges/Data)
π **Hacker Power**: Full arbitrary command execution. They gain the same privileges as the application user. Can read/write files, install backdoors, or pivot to other network assets.
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **LOW**. CVSS Vector shows `AV:N` (Network), `AC:L` (Low Complexity), `PR:N` (No Privileges Needed), `UI:N` (No User Interaction). Remote, anonymous exploitation is possible.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π’ **Public Exp?**: Yes, referenced in GHSL Advisory (GHSL-2024-045). While no specific `.py` exploit script is in the `pocs` list, the vulnerability details and code paths are publicly disclosed.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for `webui_preprocess.py` in your Bert-VITS2 directory. Look for unsanitized inputs passed to `os.system()`, `subprocess`, or similar shell execution functions around lines 82 and 130.
π§ **No Patch?**: **Isolate immediately**. Do not expose the web UI to the internet. If internal only, restrict network access. Manually audit `webui_preprocess.py` to remove unsafe command calls.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. CVSS Score is **9.8** (High). With no auth required and easy exploitation, patch or mitigate immediately to prevent remote code execution.