PRIOn Logo

CVE-2024-2004 Command injection

Remediate Within 6 Months

CVE Information

Original CVE data


When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.

CVSS v2-
CVSS v3-
References[email protected]/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/[email protected]/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
Affected Vendors

Basic Analysis

Common vulnerability metrics

Vulnerabilty type as detected by PRIOnengine

Command injection

CVSS Scores as calculated by PRIOnengine
CVSS v25
CVSS v3-



No exploit code is reported to exist.

Active Exploitation

Vulnerability is not in CISA's Known Exploited Vulnerabilities (KEV) catalog. See the KEV Catalog

Social Network Activity


Threat Actor Activity

No sightings of the vulnerability within threat reports.

Cybersecurity Frameworks

How the vulnerability maps against various cybersecurity frameworks


Compliance Impact

How the submited vulnerability affects compliance


Web Application Security Frameworks

Applicable if the issue likely affects a web application

WASC-18 - Credential and Session Prediction