<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Os-Command-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/os-command-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 12:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/os-command-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>SambaBox OS Command Injection Vulnerability (CVE-2026-3120)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sambabox-code-injection/</link><pubDate>Mon, 04 May 2026 12:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sambabox-code-injection/</guid><description>SambaBox versions 5.1 to before 5.3 are vulnerable to OS command injection via improper control of code generation (CVE-2026-3120), potentially allowing attackers with high privileges to execute arbitrary commands on the underlying system.</description><content:encoded><![CDATA[<p>CVE-2026-3120 is a critical vulnerability affecting SambaBox, a product by Profelis Information and Consulting Trade and Industry Limited Company. This vulnerability, categorized as an Improper Control of Generation of Code (&lsquo;Code Injection&rsquo;), allows for OS Command Injection. Specifically, SambaBox versions 5.1 up to (but not including) version 5.3 are affected. An attacker with high privileges can exploit this vulnerability to execute arbitrary commands on the underlying operating system, potentially leading to full system compromise. This vulnerability was reported by the Computer Emergency Response Team of the Republic of Turkey (USOM). Defenders should patch affected systems immediately or apply mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker with high privileges gains access to the SambaBox management interface.</li>
<li>The attacker crafts a malicious request containing an OS command within a vulnerable input field.</li>
<li>The SambaBox application fails to properly sanitize or validate the input.</li>
<li>The application generates code incorporating the unsanitized input.</li>
<li>The generated code is executed by the underlying operating system.</li>
<li>The injected OS command is executed with the privileges of the SambaBox application.</li>
<li>The attacker gains the ability to execute arbitrary commands on the server.</li>
<li>The attacker leverages the command execution to achieve persistence, escalate privileges further, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3120 allows an attacker to execute arbitrary commands on the SambaBox server. This could lead to complete system compromise, including data theft, modification, or destruction. The vulnerability affects SambaBox installations from version 5.1 before 5.3, potentially impacting all organizations using these versions. Given the high CVSS score of 7.2, this vulnerability poses a significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade SambaBox to version 5.3 or later to patch CVE-2026-3120.</li>
<li>Apply the following Sigma rule to detect potential exploitation attempts by monitoring for suspicious process execution: &ldquo;Detect SambaBox Command Injection&rdquo;.</li>
<li>Monitor web server logs for unusual requests targeting SambaBox applications, specifically looking for attempts to inject OS commands.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>code-injection</category><category>os-command-injection</category><category>cve-2026-3120</category></item><item><title>PraisonAI OS Command Injection Vulnerability (CVE-2026-34937)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-os-command-injection/</link><pubDate>Fri, 03 Apr 2026 23:17:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-os-command-injection/</guid><description>PraisonAI versions prior to 1.5.90 are vulnerable to OS Command Injection (CVE-2026-34937) due to insufficient escaping in the run_python() function, allowing arbitrary OS command execution via shell interpolation.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, is susceptible to an OS command injection vulnerability affecting versions prior to 1.5.90. The vulnerability, identified as CVE-2026-34937, stems from the <code>run_python()</code> function&rsquo;s construction of shell command strings. This function interpolates user-controlled code into a <code>python3 -c &quot;&lt;code&gt;&quot;</code> command and executes it using <code>subprocess.run(..., shell=True)</code>. The inadequate escaping logic, specifically the failure to escape <code>$()</code> and backtick substitutions, enables arbitrary OS command execution prior to Python&rsquo;s invocation. Users of PraisonAI are urged to upgrade to version 1.5.90 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of PraisonAI running a version prior to 1.5.90.</li>
<li>The attacker crafts malicious code containing OS command injection payloads using <code>$()</code> or backticks.</li>
<li>The attacker injects the malicious code into a parameter or input field that is processed by the <code>run_python()</code> function.</li>
<li>The <code>run_python()</code> function constructs the shell command string, interpolating the attacker&rsquo;s malicious code without proper escaping.</li>
<li>The <code>subprocess.run()</code> function executes the crafted shell command with <code>shell=True</code>.</li>
<li>The attacker&rsquo;s OS command is executed on the host system with the privileges of the PraisonAI application.</li>
<li>The attacker gains unauthorized access to the system, potentially enabling data exfiltration, system modification, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-34937) allows an attacker to execute arbitrary OS commands on the system running PraisonAI. This could lead to complete system compromise, data breaches, or denial of service. The severity is high because it allows unauthenticated or low-privileged users to gain complete control of the system. Organizations using affected versions of PraisonAI are at risk of significant data loss and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade PraisonAI to version 1.5.90 or later to patch CVE-2026-34937.</li>
<li>Deploy the Sigma rule &ldquo;Detect PraisonAI OS Command Injection Attempt&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor process creation events for the execution of unexpected processes originating from the PraisonAI application to detect post-exploitation activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-34937</category><category>os command injection</category><category>praisonai</category></item><item><title>Ruckus Unleashed Authenticated Remote Code Execution via CVE-2023-7338</title><link>https://feed.craftedsignal.io/briefs/2026-03-ruckus-rce/</link><pubDate>Thu, 26 Mar 2026 20:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-ruckus-rce/</guid><description>CVE-2023-7338 is a remote code execution vulnerability affecting Ruckus Unleashed when gateway mode is enabled, allowing authenticated remote attackers to execute arbitrary code by sending specially crafted requests through the web-based management interface.</description><content:encoded>&lt;p>CVE-2023-7338 is a critical remote code execution (RCE) vulnerability found in Ruckus Unleashed, a Wi-Fi network management solution. The vulnerability resides within the web-based management interface and requires the affected system to be operating in gateway mode. An authenticated attacker can exploit this flaw by crafting and sending malicious requests to the management interface, resulting in arbitrary code execution on the device. This vulnerability was reported by VulnCheck and assigned…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2023-7338</category><category>ruckus</category><category>rce</category><category>os command injection</category></item><item><title>Pardus OS My Computer OS Command Injection Vulnerability (CVE-2026-6849)</title><link>https://feed.craftedsignal.io/briefs/2024-01-pardus-os-command-injection/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pardus-os-command-injection/</guid><description>CVE-2026-6849 is an OS Command Injection vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus OS My Computer versions &lt;=0.7.5 before 0.8.0, allowing an attacker to execute arbitrary OS commands due to improper neutralization of special elements.</description><content:encoded><![CDATA[<p>CVE-2026-6849 is a critical vulnerability affecting Pardus OS My Computer, a software developed by TUBITAK BILGEM Software Technologies Research Institute. This OS Command Injection vulnerability exists in versions &lt;=0.7.5 and before 0.8.0. The vulnerability stems from the improper neutralization of special elements used in OS commands, potentially allowing an attacker to inject and execute arbitrary commands on the underlying operating system. Successful exploitation could lead to complete system compromise, data exfiltration, or denial-of-service conditions. Defenders should prioritize patching affected systems and implementing detection measures to identify and prevent exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an input field within Pardus OS My Computer that is vulnerable to OS command injection.</li>
<li>The attacker crafts a malicious input string containing special elements designed to be interpreted as OS commands.</li>
<li>The vulnerable software fails to properly sanitize or neutralize these special elements.</li>
<li>The software passes the unsanitized input string to an OS command interpreter (e.g., <code>system()</code>, <code>exec()</code>).</li>
<li>The OS command interpreter executes the attacker&rsquo;s injected commands with the privileges of the running application.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker uses the gained access to install malware, exfiltrate sensitive data, or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6849 can lead to a complete compromise of the affected Pardus OS My Computer system. This could allow attackers to gain unauthorized access to sensitive data, install malware, disrupt services, or pivot to other systems on the network. Given the critical nature of OS command injection vulnerabilities, organizations using affected versions of Pardus OS My Computer should prioritize patching and mitigation efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pardus OS My Computer to version 0.8.0 or later to patch CVE-2026-6849.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Pardus OS My Computer Processes</code> to your SIEM to detect potential exploitation attempts via process creation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6849</category><category>os command injection</category><category>pardus os</category></item></channel></rss>