CVE-2024-28892

9.8 CRITICAL

📋 TL;DR

An unauthenticated OS command injection vulnerability in GoCast 1.1.3 allows attackers to execute arbitrary commands on affected systems by sending specially crafted HTTP requests. This affects all systems running the vulnerable version of GoCast, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • GoCast
Versions: 1.1.3
Operating Systems: All platforms running GoCast
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of GoCast 1.1.3 are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/system privileges, installing persistent backdoors, stealing sensitive data, and pivoting to other network systems.

🟠

Likely Case

Remote code execution leading to cryptocurrency mining, ransomware deployment, or data exfiltration from the compromised system.

🟢

If Mitigated

Limited impact if system is isolated, properly segmented, and has strict egress filtering preventing command and control communication.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances immediate targets for automated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the vulnerable service.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is trivial to exploit with publicly available proof-of-concept code. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Check for updated version from GoCast developers
2. If no patch available, implement workarounds immediately
3. Consider replacing with alternative software if patching not possible

🔧 Temporary Workarounds

Network Access Control

linux

Restrict network access to GoCast service using firewall rules

iptables -A INPUT -p tcp --dport [GOCAST_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [GOCAST_PORT] -j DROP

Application Firewall/WAF

all

Deploy web application firewall to block malicious HTTP requests containing command injection patterns

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet and restrict internal network access
  • Implement strict egress filtering to prevent command and control communication from compromised systems

🔍 How to Verify

Check if Vulnerable:

Check GoCast version: If running version 1.1.3, system is vulnerable. Test with controlled payload: curl -X POST http://[TARGET]:[PORT]/vulnerable_endpoint -d 'name=$(id)'

Check Version:

Check GoCast configuration files or running process for version information

Verify Fix Applied:

Verify GoCast version is no longer 1.1.3. Test with same payload to confirm command injection no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • HTTP requests with shell metacharacters in parameters
  • Process execution from web server user context

Network Indicators:

  • HTTP POST requests to GoCast endpoints with shell commands in parameters
  • Outbound connections from GoCast server to suspicious IPs

SIEM Query:

source="web_logs" AND uri="*GoCast*" AND (param="*$(*" OR param="*`*" OR param="*;*" OR param="*|*" OR param="*&*" OR param="*>*" OR param="*<*")

🔗 References

📤 Share & Export