Palo Alto Networks Security Advisories /CVE-2024-5914CVE-2024-5914 Cortex XSOAR: Command Injection in CommonScripts PackUrgencyMODERATEResponse EffortMODERATERecoveryUSERValue DensityDIFFUSEAttack VectorNETWORKAttack ComplexityHIGHAttack RequirementsPRESENTAutomatableNOUser InteractionNONEProduct ConfidentialityLOWProduct IntegrityLOWProduct AvailabilityLOWPrivileges RequiredNONESubsequent ConfidentialityHIGHSubsequent IntegrityHIGHSubsequent AvailabilityNONENVDJSON Published2024-08-14 Updated2024-08-14ReferenceCRTX-95034DiscoveredexternallyDescriptionA command injection issue in Palo Alto Networks Cortex XSOAR CommonScripts Pack allows an unauthenticated attacker to execute arbitrary commands within the context of an integration container.Product StatusVersionsAffectedUnaffectedCortex XSOAR CommonScripts < 1.12.33>= 1.12.33Required Configuration for ExposureTo be exposed, an integration must make use of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.Severity:HIGHCVSSv4.0Base Score:7 (CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:N/AU:N/R:U/V:D/RE:M/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')SolutionThis issue is fixed in Cortex XSOAR CommonScripts 1.12.33 and all later versions.Workarounds and MitigationsRemove any integration usage of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.AcknowledgmentsPalo Alto Networks thanks Othmar Lechner for discovering and reporting this issue.Timeline2024-08-14Initial publication