A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
References
Link | Resource |
---|---|
https://github.com/facebook/tac_plus/pull/41 | Exploit Patch |
https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/ | Mailing List Third Party Advisory |
https://github.com/facebook/tac_plus/pull/41 | Exploit Patch |
https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/ | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/facebook/tac_plus/pull/41 - Exploit, Patch | |
References | () https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3 - Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/ - Mailing List, Third Party Advisory |
19 Sep 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-790 |
12 Oct 2023, 17:26
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:facebook:tac_plus:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Fedoraproject
Fedoraproject fedora Facebook tac Plus |
|
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/ - Mailing List, Third Party Advisory | |
References | (MISC) https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3 - Vendor Advisory | |
References | (MISC) https://github.com/facebook/tac_plus/pull/41 - Exploit, Patch |
10 Oct 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Oct 2023, 19:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-06 18:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45239
Mitre link : CVE-2023-45239
CVE.ORG link : CVE-2023-45239
JSON object : View
Products Affected
- tac_plus
fedoraproject
- fedora
CWE