CVE-2024-45257
Received Received - Intake
Command Injection in BYOB 2.0

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: MITRE

Description
A Command Injection issue in the payload build page in BYOB (Build Your Own Botnet) 2.0 allows attackers to execute arbitrary commands on the server via a crafted build parameter. This occurs in freeze in core/generators.py.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in BYOB 2.0 allows attackers to execute arbitrary commands on the server, which could lead to unauthorized access and control over sensitive data or systems.

Such unauthorized access and potential data compromise could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require strict controls over data confidentiality, integrity, and access.

If exploited, this vulnerability could result in data breaches or unauthorized data manipulation, thereby violating regulatory requirements for protecting personal and sensitive information.

However, the provided information does not explicitly detail the direct impact on compliance frameworks or specific regulatory consequences.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the BYOB payload build page to authorized users only and applying patches or updates that fix the command injection vulnerability in the core/generators.py file.

Additionally, monitoring and controlling the upload of files and inputs to the payload generation page can help prevent exploitation.

Since the vulnerability allows execution of arbitrary commands via crafted parameters, it is critical to validate and sanitize all inputs on the server side.

If possible, disable or limit the use of the vulnerable payload generation feature until a secure version is deployed.


Can you explain this vulnerability to me?

CVE-2024-45257 is a command injection vulnerability in the payload build page of BYOB (Build Your Own Botnet) version 2.0. It allows attackers to execute arbitrary commands on the server by sending a specially crafted build parameter. This vulnerability occurs in the freeze function within the core/generators.py file.

An exploit module leverages this vulnerability by first verifying if the target is vulnerable, then injecting commands through the payload generation page to execute arbitrary code on the server. This requires authentication but can be combined with another vulnerability (CVE-2024-45256) to gain admin access and then exploit CVE-2024-45257.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary commands on the server hosting BYOB, potentially leading to full system compromise. Attackers could run malicious code, manipulate files, escalate privileges, or maintain persistent access.

If combined with other vulnerabilities, such as an unauthenticated arbitrary file write, attackers can gain administrative access and then exploit this command injection to control the system remotely with minimal traces.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability can be performed by attempting to verify if the target system is susceptible to command injection via the payload generation page in BYOB 2.0. One practical approach is to use the Metasploit module designed for this purpose, which tests the vulnerability by uploading a file and observing the response.

Specifically, the Metasploit module first attempts to upload a malicious SQLite database to add an admin user and then tries to inject commands through the payload generation page to confirm command execution capability.

While no explicit command-line commands are provided in the resources, using the Metasploit framework with the module located at 'unix/webapp/byob_unauth_rce.rb' is the recommended method to detect this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart