CVE-2024-50611

7.2 HIGH

📋 TL;DR

CVE-2024-50611 is a code execution vulnerability in CycloneDX cdxgen where processing untrusted codebases may execute malicious code from build files like build.gradle.kts. This affects users who run cdxgen against untrusted repositories, including those using OWASP dep-scan. The vulnerability stems from a design limitation rather than implementation error.

💻 Affected Systems

Products:
  • CycloneDX cdxgen
  • OWASP dep-scan (when using vulnerable cdxgen)
Versions: All versions through 10.10.7
Operating Systems: All platforms where cdxgen runs
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability only triggers when processing untrusted codebases containing malicious build files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the cdxgen process, potentially leading to full system compromise, data theft, or lateral movement.

🟠

Likely Case

Local code execution when developers analyze untrusted projects, potentially compromising development environments and CI/CD pipelines.

🟢

If Mitigated

Limited impact when analyzing only trusted codebases with proper input validation and sandboxing.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to process a malicious codebase. Similar to CVE-2022-24441 pattern.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.10.8 and later

Vendor Advisory: https://github.com/CycloneDX/cdxgen/issues/1328

Restart Required: No

Instructions:

1. Update cdxgen to version 10.10.8 or later using npm update -g @cyclonedx/cdxgen. 2. Verify update with cdxgen --version. 3. Update any dependent tools like dep-scan.

🔧 Temporary Workarounds

Sandbox execution environment

all

Run cdxgen in isolated containers or sandboxes with minimal privileges

docker run --read-only --cap-drop=ALL -v $(pwd):/src:ro cyclonedx/cdxgen

Restrict file processing

all

Only process trusted codebases and validate build files before analysis

🧯 If You Can't Patch

  • Only analyze trusted codebases from verified sources
  • Run cdxgen with minimal user privileges and in isolated environments

🔍 How to Verify

Check if Vulnerable:

Check cdxgen version with 'cdxgen --version' or 'npm list -g @cyclonedx/cdxgen'. Versions ≤10.10.7 are vulnerable.

Check Version:

cdxgen --version

Verify Fix Applied:

Confirm version is 10.10.8 or higher with 'cdxgen --version'.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from cdxgen
  • Build file parsing errors in cdxgen logs
  • Unusual file system or network activity during SBOM generation

Network Indicators:

  • Outbound connections from cdxgen process to unexpected destinations
  • DNS requests for suspicious domains during analysis

SIEM Query:

process_name:"cdxgen" AND (process_cmdline:"*build.gradle*" OR process_cmdline:"*build.*")

🔗 References

📤 Share & Export