CVE-2023-38323

An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opennds:opennds:*:*:*:*:*:*:*:*

History

02 Feb 2024, 15:53

Type Values Removed Values Added
First Time Opennds
Opennds opennds
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-78
CPE cpe:2.3:a:opennds:opennds:*:*:*:*:*:*:*:*
References () https://www.forescout.com/resources/sierra21-vulnerabilities - () https://www.forescout.com/resources/sierra21-vulnerabilities - Exploit, Third Party Advisory
References () https://github.com/openNDS/openNDS/blob/master/ChangeLog - () https://github.com/openNDS/openNDS/blob/master/ChangeLog - Release Notes
References () https://openwrt.org/docs/guide-user/services/captive-portal/opennds - () https://openwrt.org/docs/guide-user/services/captive-portal/opennds - Product
References () https://github.com/openNDS/openNDS/releases/tag/v10.1.3 - () https://github.com/openNDS/openNDS/releases/tag/v10.1.3 - Release Notes

26 Jan 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-26 05:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-38323

Mitre link : CVE-2023-38323

CVE.ORG link : CVE-2023-38323


JSON object : View

Products Affected

opennds

  • opennds
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')