Home

Description

Koha Library before 23.05.10 fails to sanitize user-controllable filenames prior to unzipping, leading to remote code execution. The line "qx/unzip $filename -d $dirname/;" in upload-cover-image.pl is vulnerable to command injection via shell metacharacters because input data can be controlled by an attacker and is directly included in a system command, i.e., an attack can occur via malicious filenames after uploading a .zip file and clicking Process Images.

PUBLISHED Reserved 2024-05-19 | Published 2026-04-07 | Updated 2026-04-09 | Assigner mitre

References

gitlab.com/...x/misc/release_notes/release_notes_23_05_10.md

gitlab.com/...x/misc/release_notes/release_notes_23_05_11.md

github.com/hacklantic/Research/tree/main/CVE-2024-36057

koha-community.org/koha-22-05-22-released/

cve.org (CVE-2024-36057)

nvd.nist.gov (CVE-2024-36057)

Download JSON