Skip to content

Arbitrary Code using Eval in Searchor CLI's Search

Moderate
ArjunSharda published GHSA-66m2-493m-crh2 Sep 24, 2023

Package

pip searchor (pip)

Affected versions

<= 2.4.1

Patched versions

>= 2.4.2

Description

An issue in Arjun Sharda's Searchor before version v.2.4.2 allows an attacker to
execute arbitrary code via a crafted script to the eval() function in Searchor's src/searchor/main.py file, affecting the search feature in Searchor's CLI (Command Line Interface).

Impact

Versions equal to, or below 2.4.1 are affected.

Patches

Versions above, or equal to 2.4.2 have patched the vulnerability.

References

https://github.com/nikn0laty/Exploit-for-Searchor-2.4.0-Arbitrary-CMD-Injection
https://github.com/nexis-nexis/Searchor-2.4.0-POC-Exploit-
https://github.com/jonnyzar/POC-Searchor-2.4.2
#130

Severity

Moderate

CVE ID

CVE-2023-43364

Weaknesses

No CWEs