Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2091— KylinSoft youker-assistant adjust_cpufreq_scaling_governer os command injection

CVSS 7.8 · High EPSS 0.93% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-2091

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
KylinSoft youker-assistant adjust_cpufreq_scaling_governer os command injection
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
KylinSoft youker-assistant 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
KylinSoft youker-assistant是中国麒麟软件(KylinSoft)公司的一个系统管理和配置工具。 KylinSoft youker-assistant 3.1.4.13之前版本存在操作系统命令注入漏洞,该漏洞源于函数adjust_cpufreq_scaling_governer存在安全问题,攻击者利用该漏洞可以提权。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
KylinSoftyouker-assistant n/a -

II. Public POCs for CVE-2023-2091

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-2091

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2023-2091

No comments yet


Leave a comment