{"id":"CVE-2023-37469","summary":"CasaOS Command Injection vulnerability","details":"CasaOS is an open-source personal cloud system. Prior to version 0.4.4, if an authenticated user using CasaOS is able to successfully connect to a controlled SMB server, they are able to execute arbitrary commands. Version 0.4.4 contains a patch for the issue.","aliases":["GHSA-92vc-4fcw-g68q","GO-2023-2026"],"modified":"2026-04-10T04:59:19.823477Z","published":"2023-08-24T22:12:10.234Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/37xxx/CVE-2023-37469.json","cwe_ids":["CWE-77"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/IceWhaleTech/CasaOS/blob/96e92842357230098c771bc41fd3baf46189b859/route/v1/samba.go#L121"},{"type":"WEB","url":"https://github.com/IceWhaleTech/CasaOS/blob/96e92842357230098c771bc41fd3baf46189b859/service/connections.go#L58"},{"type":"WEB","url":"https://github.com/IceWhaleTech/CasaOS/releases/tag/v0.4.4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/37xxx/CVE-2023-37469.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37469"},{"type":"ADVISORY","url":"https://securitylab.github.com/advisories/GHSL-2022-119_CasaOS/"},{"type":"FIX","url":"https://github.com/IceWhaleTech/CasaOS/commit/af440eac5563644854ff33f72041e52d3fd1f47c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/icewhaletech/casaos","events":[{"introduced":"0"},{"fixed":"9d6381d7ac91d51839814a9b350f8782c3042bc3"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.4.4"}]}}],"versions":["0.1.0","0.2.5","v0.1.2","v0.1.3","v0.1.4","v0.1.5","v0.2.1","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.2.7","v0.2.8","v0.2.9","v0.3.0","v0.3.1","v0.3.1.1","v0.3.2","v0.3.2.1","v0.3.3-alpha-1","v0.3.3-alpha-2","v0.3.5.1","v0.3.6","v0.3.7","v0.3.8","v0.4.0","v0.4.0-alpha1","v0.4.0-alpha2","v0.4.0-alpha4","v0.4.0-alpha5","v0.4.1","v0.4.1-alpha1","v0.4.1-alpha2","v0.4.1-alpha3","v0.4.1-alpha4","v0.4.1-alpha5","v0.4.2","v0.4.2-alpha1","v0.4.2-alpha2","v0.4.2-alpha3","v0.4.2-alpha4","v0.4.2-alpha5","v0.4.2-alpha6","v0.4.2-alpha8","v0.4.2-alpha9","v0.4.3","v0.4.3-1","v0.4.3-alpha1","v0.4.3-alpha2","v0.4.3-alpha3","v0.4.4-alpha1","v0.4.4-alpha2","v0.4.4-alpha3","v0.4.4-alpha4","v0.4.4-alpha5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-37469.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}