An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
References
Link | Resource |
---|---|
https://github.com/openNDS/openNDS/blob/master/ChangeLog | Release Notes |
https://github.com/openNDS/openNDS/releases/tag/v10.1.3 | Release Notes |
https://openwrt.org/docs/guide-user/services/captive-portal/opennds | Product |
https://www.forescout.com/resources/sierra21-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-01-26 05:15
Updated : 2024-02-02 15:53
NVD link : CVE-2023-38323
Mitre link : CVE-2023-38323
CVE.ORG link : CVE-2023-38323
JSON object : View
Products Affected
opennds
- opennds
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')