First published: Sat Sep 07 2024(Updated: )
Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Planning Analytics | <=2.1 | |
IBM Planning Analytics | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36138 is classified as a high-severity vulnerability due to the potential for arbitrary code execution.
To mitigate CVE-2024-36138, update to IBM Planning Analytics versions beyond 2.1 or 2.0, which contain the patched code.
CVE-2024-36138 affects IBM Planning Analytics versions 2.1 and 2.0.
CVE-2024-36138 is a command injection vulnerability that allows attackers to execute arbitrary commands.
The vulnerability was caused by improper handling of batch files through the child_process.spawn method in Node.js.