CVE-2023-49329

Anomali Match before 4.6.2 allows OS Command Injection. An authenticated admin user can inject and execute operating system commands. This arises from improper handling of untrusted input, enabling an attacker to elevate privileges, execute system commands, and potentially compromise the underlying operating system. The fixed versions are 4.4.5, 4.5.4, and 4.6.2. The earliest affected version is 4.3.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:anomali:match:*:*:*:*:*:*:*:*
cpe:2.3:a:anomali:match:*:*:*:*:*:*:*:*
cpe:2.3:a:anomali:match:*:*:*:*:*:*:*:*

History

26 Jan 2024, 19:01

Type Values Removed Values Added
References () https://www.anomali.com/security-advisory/anml-2023-01 - () https://www.anomali.com/security-advisory/anml-2023-01 - Mitigation, Vendor Advisory
References () https://www.anomali.com/collaborate/ciso-blog - () https://www.anomali.com/collaborate/ciso-blog - Product
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time Anomali
Anomali match
CPE cpe:2.3:a:anomali:match:*:*:*:*:*:*:*:*

19 Jan 2024, 22:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-19 21:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-49329

Mitre link : CVE-2023-49329

CVE.ORG link : CVE-2023-49329


JSON object : View

Products Affected

anomali

  • match
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')