{"id":"CVE-2024-53992","summary":"unzip-bot Allows Remote Code Execution (RCE) via archive extraction, password prompt, or video upload","details":"unzip-bot is a Telegram bot to extract various types of archives. Users could exploit unsanitized inputs to inject malicious commands that are executed through subprocess.Popen with shell=True. Attackers can exploit this vulnerability using a crafted archive name, password, or video name. This vulnerability is fixed in 7.0.3a.","aliases":["GHSA-34cg-7f8c-fm5h"],"modified":"2026-04-10T05:18:59.512553Z","published":"2024-12-02T17:03:22.631Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53992.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-78"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53992.json"},{"type":"ADVISORY","url":"https://github.com/EDM115/unzip-bot/security/advisories/GHSA-34cg-7f8c-fm5h"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53992"},{"type":"FIX","url":"https://github.com/EDM115/unzip-bot/commit/5213b693eabb562842cdbf21c1074e91bfa00274"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/edm115/unzip-bot","events":[{"introduced":"0"},{"fixed":"e9889a954f60593f84051d9053bcab4d05ee0df7"}]}],"versions":["2.0","3.0","6.0","6.2","6.3","6.3.2","6.3.3","7.0.0a","7.0.0a-herokufix"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53992.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N"}]}