Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment.
References
Link | Resource |
---|---|
https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2023-0093/ | Vendor Advisory |
https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2023-0093/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2023-0093/ - Vendor Advisory |
Information
Published : 2023-03-06 21:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0093
Mitre link : CVE-2023-0093
CVE.ORG link : CVE-2023-0093
JSON object : View
Products Affected
okta
- advanced_server_access
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')