Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-39686 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary Command Execution in Bert-VITS2 v2.3. πŸ’₯ **Consequences**: Attackers can run malicious system commands, leading to total server compromise, data theft, or service disruption.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-78 (OS Command Injection). The flaw lies in `webui_preprocess.py`, where user inputs are likely passed directly to system shells without proper sanitization.

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Users running **Bert-VITS2 version 2.3**. Specifically, the FishAudio open-source TTS model backbone. Check your local installation version.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Hacker Power**: Full arbitrary command execution. They gain the same privileges as the application user. Can read/write files, install backdoors, or pivot to other network assets.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **LOW**. CVSS Vector shows `AV:N` (Network), `AC:L` (Low Complexity), `PR:N` (No Privileges Needed), `UI:N` (No User Interaction). Remote, anonymous exploitation is possible.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exp?**: Yes, referenced in GHSL Advisory (GHSL-2024-045). While no specific `.py` exploit script is in the `pocs` list, the vulnerability details and code paths are publicly disclosed.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for `webui_preprocess.py` in your Bert-VITS2 directory. Look for unsanitized inputs passed to `os.system()`, `subprocess`, or similar shell execution functions around lines 82 and 130.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: Yes. The vendor (FishAudio) and security researchers (GHSL) have disclosed the issue. Check the official GitHub repository for updates or patches post-July 2024.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Isolate immediately**. Do not expose the web UI to the internet. If internal only, restrict network access. Manually audit `webui_preprocess.py` to remove unsafe command calls.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. CVSS Score is **9.8** (High). With no auth required and easy exploitation, patch or mitigate immediately to prevent remote code execution.