CVE-2023-30856
Summary
| CVE | CVE-2023-30856 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-28 16:15:00 UTC |
| Updated | 2023-05-10 16:48:00 UTC |
| Description | eDEX-UI is a science fiction terminal emulator. Versions 2.2.8 and prior are vulnerable to cross-site websocket hijacking. When running eDEX-UI and browsing the web, a malicious website can connect to eDEX's internal terminal control websocket, and send arbitrary commands to the shell. The project has been archived since 2021, and as of time of publication there are no plans to patch this issue and release a new version. Some workarounds are available, including shutting down eDEX-UI when browsing the web and ensuring the eDEX terminal runs with lowest possible privileges. |
Risk And Classification
Problem Types: CWE-346
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Edex-ui Project | Edex-ui | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cross-site websocket hijacking enables remote command execution (RCE) · Advisory · GitSquared/edex-ui · GitHub | MISC | github.com | |
| Cross-Site WebSocket Hijacking (CSWSH) | MISC | christian-schneider.net | |
| edex-ui/terminal.class.js at 04a00c4079908788b371c6ecdefff96d0d9950f8 · GitSquared/edex-ui · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.