Platform
other
Component
helix-sync
Fixed in
2024.1
CVE-2024-0325 describes a Command Injection vulnerability discovered in Helix Sync. This flaw allows a local attacker to execute arbitrary commands on the system. The vulnerability affects versions prior to 2024.1, and a fix is available in version 2024.1. Bryan Riggins reported the issue.
Successful exploitation of CVE-2024-0325 could allow an attacker with local access to execute arbitrary commands on the system running Helix Sync. This could lead to a complete system compromise, including data theft, modification, or destruction. The attacker would need to be present on the same machine as the vulnerable Helix Sync instance to exploit this vulnerability. The potential impact is significant, as it bypasses standard authentication and authorization mechanisms.
CVE-2024-0325 is not currently listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, suggesting a low probability of immediate widespread exploitation. The vulnerability was disclosed on 2024-02-01.
Exploit Status
EPSS
0.11% (29% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2024-0325 is to upgrade Helix Sync to version 2024.1 or later. If an immediate upgrade is not possible, restrict local access to the Helix Sync server to only trusted users. Consider implementing stricter file system permissions to limit the attacker's ability to execute commands. There are no specific WAF or proxy rules applicable to this local command injection vulnerability. After upgrading, verify the fix by attempting to execute a command through the vulnerable endpoint and confirming that it is blocked.
Update Helix Sync to version 2024.1 or later. The update will fix the (command injection) vulnerability and protect your system. See Perforce documentation for detailed instructions on how to update.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2024-0325 is a Command Injection vulnerability affecting Helix Sync versions prior to 2024.1. It allows a local attacker to execute arbitrary commands.
You are affected if you are running Helix Sync versions 0.0.0–2024.1 and have not upgraded to version 2024.1 or later.
Upgrade Helix Sync to version 2024.1 or later. If immediate upgrade is not possible, restrict local access to the server.
There are currently no widespread reports of active exploitation, but the vulnerability remains a risk.
Refer to the Helix Sync release notes and security advisories on the official Helix Sync website for details.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.