An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 27 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4. | |
| Title | Velociraptor Shell Plugin Prevent_execve Bypass | |
| Weaknesses | CWE-281 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: rapid7
Published: 2025-02-27T16:07:49.577Z
Updated: 2025-02-27T16:19:54.044Z
Reserved: 2025-01-30T22:39:47.257Z
Link: CVE-2025-0914
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-02-27T16:19:50.202Z
 NVD
                        NVD
                    Status : Received
Published: 2025-02-27T16:15:38.237
Modified: 2025-02-27T16:15:38.237
Link: CVE-2025-0914
 Redhat
                        Redhat
                    No data.