An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
References
Link | Resource |
---|---|
https://github.com/openNDS/openNDS/blob/master/ChangeLog | Release Notes |
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | Release Notes |
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | Product |
https://www.forescout.com/resources/sierra21-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-26 05:15
Updated : 2024-02-02 15:54
NVD link : CVE-2023-38318
Mitre link : CVE-2023-38318
CVE.ORG link : CVE-2023-38318
JSON object : View
Products Affected
opennds
- opennds
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')