First published: Thu Feb 02 2023(Updated: )
A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dst-admin | =1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-0647 is high with a CVSS score of 7.5.
The affected software by CVE-2023-0647 is dst-admin 1.5.0.
The vulnerability in CVE-2023-0647 manifests as a command injection in the userId argument of the /home/kickPlayer functionality of dst-admin 1.5.0.
Yes, CVE-2023-0647 can be exploited remotely.
To mitigate CVE-2023-0647, it is recommended to apply the latest security patches or updates provided by dst-admin Project for version 1.5.0.