{"id":"GHSA-jf28-v5f6-cvpr","summary":"NASA AIT-Core vulnerable to remote code execution","details":"An issue in NASA AIT-Core v2.5.2 allows attackers to execute arbitrary code via a crafted packet.","aliases":["CVE-2024-35057"],"modified":"2026-03-13T22:13:58.920015Z","published":"2024-05-21T18:31:24Z","related":["CVE-2024-35057"],"database_specific":{"github_reviewed":true,"github_reviewed_at":"2024-08-02T01:22:39Z","nvd_published_at":"2024-05-21T18:15:09Z","cwe_ids":["CWE-319"],"severity":"CRITICAL"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35057"},{"type":"WEB","url":"https://github.com/NASA-AMMOS/AIT-Core/issues/528"},{"type":"PACKAGE","url":"https://github.com/NASA-AMMOS/AIT-Core"},{"type":"WEB","url":"https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze"}],"affected":[{"package":{"name":"ait-core","ecosystem":"PyPI","purl":"pkg:pypi/ait-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"2.5.2"}]}],"versions":["1.0.0","1.1.0","1.2.0","1.3.0","1.4.0","2.0.0","2.0.1","2.0rc1.dev0","2.1.0","2.2.0","2.3.0","2.3.1","2.3.2","2.3.3","2.3.4","2.3.5","2.4.0","2.5.0","2.5.1","2.5.2"],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-jf28-v5f6-cvpr/GHSA-jf28-v5f6-cvpr.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}]}