This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Crawl4AI < 0.8.0 suffers from **Code Injection**. π **Consequences**: Attackers execute arbitrary Python code via the `/crawl` endpoint, leading to **full server compromise** and remote command execution.β¦
π‘οΈ **CWE-94**: Improper Control of Generation of Code ('Code Injection'). π **Flaw**: The Docker API accepts a `hooks` parameter containing Python code and executes it directly using `exec()`.β¦
π₯ **Vendor**: UncleCode. π¦ **Product**: Crawl4AI (LLM-friendly web crawler). π **Affected Versions**: All versions **prior to 0.8.0**. π« **Fixed in**: 0.8.0.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Unauthenticated Remote Code Execution (RCE). ποΈ **Data**: Full control over the server. π Attackers can run **any system command**, access sensitive data, and pivot to other internal systems.β¦
π **Threshold**: VERY LOW. π« **Auth**: None required (Unauthenticated). βοΈ **Config**: Direct access to the Docker API `/crawl` endpoint. π― **Complexity**: Low (CVSS: L). Just send a malicious payload.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π’ **Public Exp?**: Yes, detailed in the Vendor Advisory (GHSA-5882-5rx9-xgxp) and Third-Party Advisory. π **Wild Exploitation**: High risk due to low barrier to entry.β¦
π **Self-Check**: Scan for Crawl4AI services exposing the `/crawl` endpoint. π§ͺ **Test**: Send a request with a `hooks` parameter containing harmless Python code (e.g., `print('test')`).β¦
β **Fixed**: Yes. π οΈ **Patch**: Upgrade to **Crawl4AI version 0.8.0** or later. π **Reference**: See the GitHub Security Advisory for official mitigation steps. π Update immediately.
Q9What if no patch? (Workaround)
π§ **Workaround**: If upgrading is impossible, **block external access** to the `/crawl` endpoint via firewall rules. π Disable the `hooks` functionality if configurable. π« Restrict network access to trusted IPs only.β¦