First published: Mon Mar 25 2024(Updated: )
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in openEuler aops-zeus on Linux allows Command Injection. This vulnerability is associated with program files https://gitee.Com/openeuler/aops-zeus/blob/master/zeus/conf/constant.Py. This issue affects aops-zeus: from 1.2.0 through 1.4.0.
Credit: securities@openeuler.org
Affected Software | Affected Version | How to fix |
---|---|---|
openEuler | >=1.2.0<=1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24899 is classified as a high-severity vulnerability due to its potential for OS command injection.
To mitigate CVE-2024-24899, update openEuler aops-zeus to a version newer than 1.4.0 or apply relevant security patches.
CVE-2024-24899 affects openEuler aops-zeus versions from 1.2.0 to 1.4.0.
CVE-2024-24899 is an OS Command Injection vulnerability, allowing attackers to execute arbitrary commands.
Yes, CVE-2024-24899 can potentially be exploited remotely if the vulnerable software is accessible over a network.