CVE-2023-34105

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-34105
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34105.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-34105
Aliases
  • GHSA-vpr5-779c-cx62
Published
2023-06-12T16:30:39Z
Modified
2025-10-30T20:20:58.688236Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
SRS has command injection vulnerability in demonstration api-server for HTTP callback.
Details

SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS's api-server server is vulnerable to a drive-by command injection. An attacker may send a request to the /api/v1/snapshots endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

Git / github.com/ossrs/srs

Affected ranges

Type
GIT
Repo
https://github.com/ossrs/srs
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0

v1.*

v1.0-r0

v2.*

v2.0-a0
v2.0-a1
v2.0-a2
v2.0-a3
v2.0-b0
v2.0-b1
v2.0-b2
v2.0-b3
v2.0-b4
v2.0-r0
v2.0-r1
v2.0-r2
v2.0-r3
v2.0-r4
v2.0-r5
v2.0-r6
v2.0-r7
v2.0-r8

v3.*

v3.0-a0
v3.0-a1
v3.0-a2
v3.0-a3
v3.0-a4
v3.0-a5
v3.0-a6
v3.0-a7
v3.0-a8
v3.0-a9
v3.0-b0
v3.0-b1
v3.0-b2
v3.0-b3
v3.0-b4
v3.0-r0
v3.0-r1
v3.0-r2
v3.0-r3

v4.*

v4.0-b0
v4.0-b1
v4.0-b10
v4.0-b2
v4.0-b3
v4.0-b5
v4.0-b6
v4.0-b7
v4.0-b8
v4.0-b9
v4.0-r0
v4.0-r1
v4.0-r2
v4.0-r3
v4.0-r4

v5.*

v5.0-a0
v5.0-a1
v5.0-a2
v5.0-a3
v5.0-a4
v5.0-a5
v5.0-b0
v5.0-b1
v5.0-b2
v5.0-b3
v5.0-b4
v5.0-b5
v5.0-b6
v5.0-b7
v5.0-r0