• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical vulnerabilities uncovered in open source casaos cloud software

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software

You are here: Home / General Cyber Security News / Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software
October 17, 2023

Two critical security flaws uncovered in the open up-supply CasaOS own cloud software could be effectively exploited by attackers to attain arbitrary code execution and choose more than susceptible programs.

The vulnerabilities, tracked as CVE-2023-37265 and CVE-2023-37266, the two carry a CVSS score of 9.8 out of a maximum of 10.

Sonar security researcher Thomas Chauchefoin, who uncovered the bugs, claimed they “let attackers to get about authentication demands and attain full entry to the CasaOS dashboard.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Even far more troublingly, CasaOS’ support for third-party apps could be weaponized to run arbitrary commands on the program to obtain persistent accessibility to the machine or pivot into inside networks.

Adhering to responsible disclosure on July 3, 2023, the flaws have been resolved in edition .4.4 produced by its maintainers IceWhale on July 14, 2023.

A short description of the two flaws is as follows –

  • CVE-2023-37265 – Incorrect identification of the resource IP tackle, allowing unauthenticated attackers to execute arbitrary commands as root on CasaOS instances
  • CVE-2023-37265 – Unauthenticated attackers can craft arbitrary JSON Web Tokens (JWTs) and obtain attributes that involve authentication and execute arbitrary instructions as root on CasaOS instances

A consequence of profitable exploitation of the aforementioned flaws could allow for attackers to get about authentication restrictions and get administrative privileges on susceptible CasaOS situations.

Cybersecurity

“In normal, identifying IP addresses at the application layer is risk-vulnerable and should not be relied on for security choices,” Chauchefoin explained.

“Quite a few diverse headers could transport this information (X-Forwarded-For, Forwarded, and many others.), and the language APIs sometimes need to interpret nuances of the HTTP protocol the exact same way. Equally, all frameworks have their very own quirks and can be difficult to navigate devoid of skilled know-how of these common security footguns.”

Located this post attention-grabbing? Abide by us on Twitter  and LinkedIn to go through more exclusive content we post.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «webinar: locking down financial and accounting data — best data Webinar: Locking Down Financial and Accounting Data — Best Data Security Strategies
Next Post: Discord: A Playground for Nation-State Hackers Targeting Critical Infrastructure discord: a playground for nation state hackers targeting critical infrastructure»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.