Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2947: Improper Neutralization of Special Elements used in a Command ('Command Injection')

0
High
VulnerabilityCVE-2024-2947cvecve-2024-2947
Published: Thu Mar 28 2024 (03/28/2024, 18:31:59 UTC)
Source: CVE Database V5

Description

A flaw was found in Cockpit. Deleting a sosreport with a crafted name via the Cockpit web interface can lead to a command injection vulnerability, resulting in privilege escalation. This issue affects Cockpit versions 270 and newer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:46:42 UTC

Technical Analysis

CVE-2024-2947 is a command injection vulnerability identified in Cockpit, an open-source web-based server management interface widely used for Linux system administration. The vulnerability exists in Cockpit versions 270 and newer and is triggered when a user attempts to delete a sosreport—a diagnostic archive—with a specially crafted filename via the Cockpit web interface. The flaw stems from improper neutralization of special elements in the sosreport name, allowing malicious input to be interpreted as shell commands. This leads to command injection, enabling an attacker to execute arbitrary commands with the privileges of the Cockpit process. Given that Cockpit typically runs with elevated privileges, successful exploitation can result in privilege escalation, compromising system confidentiality, integrity, and availability. The vulnerability requires local access with some privileges (as indicated by the CVSS vector AV:L/PR:L/UI:R), and user interaction is necessary to trigger the flaw. Although no known exploits have been reported in the wild, the high CVSS score (7.3) reflects the significant risk posed by this vulnerability. The issue highlights the critical importance of proper input validation and sanitization in web interfaces that interact with system commands. Since Cockpit is commonly deployed on Linux servers for system management, this vulnerability can impact a broad range of organizations relying on it for operational tasks.

Potential Impact

The impact of CVE-2024-2947 is substantial for organizations using Cockpit for server management. Successful exploitation allows attackers to execute arbitrary commands on affected systems, leading to full privilege escalation. This can result in unauthorized access to sensitive data, modification or deletion of critical files, disruption of system operations, and potential lateral movement within networks. The compromise of system integrity and availability can affect business continuity and lead to data breaches or service outages. Since Cockpit is often used in enterprise environments, cloud infrastructures, and data centers, the vulnerability poses a risk to critical IT infrastructure worldwide. Organizations with multi-tenant environments or those managing large fleets of Linux servers are particularly vulnerable. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate the threat, especially in environments where multiple users have access or where attackers can trick legitimate users into performing actions. The absence of known exploits in the wild provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2024-2947, organizations should: 1) Apply patches or updates from Cockpit maintainers as soon as they become available to address the input sanitization flaw. 2) Restrict access to the Cockpit web interface to trusted administrators only, using network segmentation and firewall rules. 3) Enforce the principle of least privilege by limiting user permissions within Cockpit, preventing unprivileged users from deleting sosreports or performing sensitive actions. 4) Implement input validation and sanitization controls on any custom integrations or scripts interacting with Cockpit to prevent injection of malicious commands. 5) Monitor system logs and Cockpit audit trails for unusual sosreport deletion attempts or command execution patterns. 6) Educate users about the risks of interacting with suspicious filenames or links within the management interface. 7) Consider disabling sosreport deletion via the web interface if not required or restricting it to command-line operations with stricter controls. These measures, combined with timely patching, will reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-03-26T16:48:38.370Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f698540b920e2708380e6

Added to database: 11/20/2025, 7:18:29 PM

Last enriched: 2/28/2026, 10:46:42 AM

Last updated: 3/23/2026, 11:14:28 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses