Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2023-37265
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-17 Jul, 2023 | 21:15
Updated At-07 Apr, 2025 | 13:54

CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

icewhale
icewhale
>>casaos>>Versions before 0.4.4(exclusive)
cpe:2.3:o:icewhale:casaos:*:*:*:*:*:*:*:*
icewhale
icewhale
>>casaos>>0.4.4
cpe:2.3:o:icewhale:casaos:0.4.4:alpha1:*:*:*:*:*:*
icewhale
icewhale
>>casaos>>0.4.4
cpe:2.3:o:icewhale:casaos:0.4.4:alpha2:*:*:*:*:*:*
icewhale
icewhale
>>casaos>>0.4.4
cpe:2.3:o:icewhale:casaos:0.4.4:alpha3:*:*:*:*:*:*
icewhale
icewhale
>>casaos>>0.4.4
cpe:2.3:o:icewhale:casaos:0.4.4:alpha4:*:*:*:*:*:*
icewhale
icewhale
>>casaos>>0.4.4
cpe:2.3:o:icewhale:casaos:0.4.4:alpha5:*:*:*:*:*:*
icewhale
icewhale
>>casaos-gateway>>Versions before 0.4.4(exclusive)
cpe:2.3:a:icewhale:casaos-gateway:*:*:*:*:*:*:*:*
icewhale
icewhale
>>casaos-gateway>>0.4.4
cpe:2.3:a:icewhale:casaos-gateway:0.4.4:alpha1:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Secondarysecurity-advisories@github.com
CWE-306Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7security-advisories@github.com
Patch
https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6gsecurity-advisories@github.com
Patch
Vendor Advisory
https://www.sonarsource.com/blog/security-vulnerabilities-in-casaossecurity-advisories@github.com
Third Party Advisory
Exploit
https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6gaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
Change History
0Changes found

Details not found