This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: OS Command Injection in **Catalyst** framework. <br>π₯ **Consequences**: Attackers can execute arbitrary commands with **root privileges** on the host OS via malicious templates.β¦
π‘οΈ **CWE-78**: Improper Neutralization of Special Elements used in an OS Command. <br>π **Flaw**: Server templates define installation scripts that execute directly on the OS without sanitization, allowing injection.
Q3Who is affected? (Versions/Components)
π¦ **Vendor**: karutoil. <br>π¦ **Product**: Catalyst (Web Application Framework). <br>β οΈ **Affected**: Any instance using templates with installation scripts that allow user creation/update permissions.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: **Root** level access. <br>π **Data**: Full read/write access to the host OS. <br>π **Impact**: Remote Code Execution (RCE) leading to complete server takeover.
Q5Is exploitation threshold high? (Auth/Config)
π **Auth Required**: **Low**. Requires **Low Privileges** (PR:L). <br>π― **Condition**: User must have permission to **create or update** server templates. No UI interaction needed (UI:N).
Q6Is there a public Exp? (PoC/Wild Exploitation)
π« **Public Exploit**: **None** currently listed in POCs. <br>π **Status**: Advisory and fix commit are public, but no wild exploitation or PoC code is available yet.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for **Catalyst** framework usage. <br>π **Audit**: Review template configurations for any scripts executing OS commands. Check if users have template edit rights.
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **Yes**. <br>π **Patch**: Commit `11980aaf3f46315b02777f325ba02c56b110165d` addresses the issue. Update to the patched version immediately.
Q9What if no patch? (Workaround)
π‘οΈ **Workaround**: Restrict **template creation/update** permissions to trusted admins only. <br>π« **Mitigation**: Disable direct OS execution in templates if possible.β¦