PT-2024-05: Remote Code Execution when creating a project from a git repository in PT Application Inspector (PT AI)

CRITICAL
(9.3) CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:L

Vendor: Positive Technologies

Product: PT Application Inspector (PT AI)

Vulnerable version: 4.3.1 - 4.7.2

Vulnerability type:

- CWE-141: Improper Neutralization of Parameter/Argument Delimiters

Vulnerability vector:

- Base vulnerability score (CVSSv3.1): CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

- Severity (CVSSv3.1): 9.0 (critical)

- Base vulnerability score (CVSSv4.0): CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:L/SA:L

- Severity (CVSSv4.0): 9.3 (critical)

Description:

The vulnerability was identified in PT AI affecting versions 4.3.1 to 4.7.2.
The vulnerability can be exploited by an attacker with network access to the PT AI control server to remotely execute code on the control server. Exploitation of the vulnerability requires authorization of the "project security manager" role or higher.

Vulnerability status: Confirmed by vendor

Date of vulnerability detection: 31.07.2024

Recommendations:

- Update to version 4.3.1.37717 or higher

- Update to version 4.7.3 or higher

Additional information: Security Bulletin

Researcher: Aleksey Goncharov (Positive Technologies)

Vendor:
Positive Technologies
Vulnerable product:
PT Application Inspector (PT AI)

Get in touch

Fill in the form and our specialists
will contact you shortly