{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T03:16:19.763","vulnerabilities":[{"cve":{"id":"CVE-2024-28114","sourceIdentifier":"security-advisories@github.com","published":"2024-03-12T20:15:08.113","lastModified":"2025-02-20T17:18:20.863","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Peering Manager is a BGP session management tool. There is a Server Side Template Injection vulnerability that leads to Remote Code Execution in Peering Manager <=1.8.2. As a result arbitrary commands can be executed on the operating system that is running Peering Manager. This issue has been addressed in version 1.8.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n"},{"lang":"es","value":"Peering Manager es una herramienta de gestión de sesiones BGP. Existe una vulnerabilidad de inyección de plantilla del lado del servidor que conduce a la ejecución remota de código en Peering Manager &lt;=1.8.2. Como resultado, se pueden ejecutar comandos arbitrarios en el sistema operativo que ejecuta Peering Manager. Este problema se solucionó en la versión 1.8.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.3","matchCriteriaId":"B1DD9909-194C-4B81-A9D6-0E24FEA824C0"}]}]}],"references":[{"url":"https://github.com/peering-manager/peering-manager/commit/8a865fb596c11ad7caf45aef317d8fcbce7f85ff","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/peering-manager/peering-manager/security/advisories/GHSA-q37x-qfrx-jcv6","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://owasp.org/www-community/attacks/Command_Injection","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server_Side_Template_Injection","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://stackoverflow.com/questions/73939573/how-to-sanitise-string-of-python-code-with-python","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://github.com/peering-manager/peering-manager/commit/8a865fb596c11ad7caf45aef317d8fcbce7f85ff","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/peering-manager/peering-manager/security/advisories/GHSA-q37x-qfrx-jcv6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://owasp.org/www-community/attacks/Command_Injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server_Side_Template_Injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https://stackoverflow.com/questions/73939573/how-to-sanitise-string-of-python-code-with-python","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]}]}}]}