An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the network interface name entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
References
Link | Resource |
---|---|
https://github.com/openNDS/openNDS/blob/master/ChangeLog | Release Notes |
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | Release Notes |
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | Product |
https://www.forescout.com/resources/sierra21-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-26 05:15
Updated : 2024-02-02 15:54
NVD link : CVE-2023-38317
Mitre link : CVE-2023-38317
CVE.ORG link : CVE-2023-38317
JSON object : View
Products Affected
opennds
- opennds
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')