CVE-2023-43364
at the time of writing,
cve-2023-43364
is in the reserved state
a vulnerability classified as problematic was found in searchor up to 2.4.1. Affected by this vulnerability is the function
eval
of the file src/searchor/main.py of the component CLI. As an impact it is known to affect confidentiality, integrity, and availability.
the weakness was disclosed 09/26/2023. the advisory is shared at github.com. This vulnerability is known as CVE-2023-43364 since 09/18/2023. Technical details are known, but no exploit is available.
Exploit
The vulnerability is present in the
main.py
file of searchor version 2.4.0
- The
search
function block contains theurl
variable that uses the eval function, to dynamically construct a URL based on user input that’s stored to thequery
variable - The problem is that there is not a single form of input sanitization in place as the user input variable,
query
, is passed directly on to the the eval function via f string or string literal - This essentially allows injection of arbitrary Python command
Script
additionally, there are many poc exploits available online