First published: Mon Mar 25 2024(Updated: )
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in openEuler gala-gopher on Linux allows Command Injection. This vulnerability is associated with program files https://gitee.Com/openeuler/gala-gopher/blob/master/src/probes/extends/ebpf.Probe/src/ioprobe/ioprobe.C. This issue affects gala-gopher: through 1.0.2.
Credit: securities@openeuler.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenAtom OpenEuler | <=1.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-24890 is classified as critical due to its capability for OS command injection.
To fix CVE-2024-24890, update to the latest version of openEuler gala-gopher beyond version 1.0.2.
CVE-2024-24890 is caused by improper neutralization of special elements in an OS Command, allowing command injection.
CVE-2024-24890 affects openEuler gala-gopher versions up to and including 1.0.2 on Linux.
Yes, CVE-2024-24890 can be exploited remotely, allowing attackers to execute arbitrary commands on the affected system.