CVE-2023-38378

The web interface on the RIGOL MSO5000 digital oscilloscope with firmware 00.01.03.00.03 allows remote attackers to execute arbitrary code via shell metacharacters in pass1 to the webcontrol changepwd.cgi application.
References
Link Resource
https://news.ycombinator.com/item?id=36745664 Issue Tracking Third Party Advisory
https://tortel.li/post/insecure-scope/ Exploit Third Party Advisory
https://news.ycombinator.com/item?id=36745664 Issue Tracking Third Party Advisory
https://tortel.li/post/insecure-scope/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:rigol:mso5000_firmware:00.01.03.00.03:*:*:*:*:*:*:*
cpe:2.3:h:rigol:mso5000:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://news.ycombinator.com/item?id=36745664 - Issue Tracking, Third Party Advisory () https://news.ycombinator.com/item?id=36745664 - Issue Tracking, Third Party Advisory
References () https://tortel.li/post/insecure-scope/ - Exploit, Third Party Advisory () https://tortel.li/post/insecure-scope/ - Exploit, Third Party Advisory

26 Jul 2023, 01:11

Type Values Removed Values Added
CPE cpe:2.3:o:rigol:mso5000_firmware:00.01.03.00.03:*:*:*:*:*:*:*
cpe:2.3:h:rigol:mso5000:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Rigol mso5000 Firmware
Rigol mso5000
Rigol
CWE CWE-78
References (MISC) https://news.ycombinator.com/item?id=36745664 - (MISC) https://news.ycombinator.com/item?id=36745664 - Issue Tracking, Third Party Advisory
References (MISC) https://tortel.li/post/insecure-scope/ - (MISC) https://tortel.li/post/insecure-scope/ - Exploit, Third Party Advisory

16 Jul 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-16 17:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38378

Mitre link : CVE-2023-38378

CVE.ORG link : CVE-2023-38378


JSON object : View

Products Affected

rigol

  • mso5000_firmware
  • mso5000
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')