Ironman Software Forums
Continue the conversion on the Ironman Software forums. Chat with over 1000 users about PowerShell, PowerShell Universal, and PowerShell Pro Tools.
All supported versions of PowerShell Universal are affected by CVE-2023-49213. This vulnerability allows remote attackers to execute arbitrary commands over HTTP by exploiting the PowerShell Universal API endpoints with specially crafted requests. Please update immediately. Patched versions include:
CVE-2023-49213 is a remote code execution vulnerability that affects all supported versions of PowerShell Universal. Due to improper sanitization of input strings, an attacker can provide specially crafted input to the PowerShell Universal API endpoints to execute arbitrary commands on the server. Endpoints that require authentication will require that the attacker has valid credentials. See below for technical information about the vulnerability.
All supported versions of PowerShell Universal 3.0.0 through 4.2.0.
Upgrade to PowerShell Universal to one of the following versions:
It is also possible to avoid this issue by adjusting endpoints to avoid using a param
block. For example, if you have an endpoint that is implemented like this:
param(
[string]$Name
)
$Name
You would remove the param
and use the $Name
variable directly. The script would become the following.
$Name
Due to invalid processing of parameter values, certain strings would execute commands on the server when applying them to a parameter. For example, the following request would execute Start-Process
on the server and open Notepad.
import requests
url = "http://localhost:5000/exploit"
payload = {'exploit': '\'(Start-Process Notepad)\''}
files=[]
headers = {}
response = requests.request("PUT", url, headers=headers, data=payload, files=files)
Any endpoint that contains parameters, like below, is susceptible to this vulnerability.
param(
[string]$exploit
)
$exploit
Ironman Software would like to thank Héctor Cavalcanti Saavedra from Autosécurité SA for reporting this vulnerability. We encourage all users and security researchers to review our security policy and responsibly disclose any vulnerabilities to Ironman Software.
Please contact Ironman Software support.
Continue the conversion on the Ironman Software forums. Chat with over 1000 users about PowerShell, PowerShell Universal, and PowerShell Pro Tools.
Receive once-a-month updates about Ironman Software. You'll learn about our product updates and blogs related to PowerShell.