Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-38323

Опубликовано: 26 янв. 2024
Источник: debian

Описание

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openndsfixed10.2.0+dfsg-1package

Примечания

  • https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2023-006-r3.ashx

  • From v10 onwards, statuspath configuration value is urlencoded, marking first 10.x upload as fixed for sid

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
nvd
около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.

CVSS3: 9.8
github
около 2 лет назад

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.