First published: Fri Nov 17 2023(Updated: )
An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a try_to_authenticate NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing client token query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenNDS Captive Portal | <10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38315 is a vulnerability in OpenNDS Captive Portal before version 10.1.2, where a crafted GET HTTP request can trigger a NULL pointer dereference, leading to a denial-of-service condition.
CVE-2023-38315 has a severity rating of 7.5 out of 10, indicating a high severity vulnerability.
CVE-2023-38315 can be exploited by sending a crafted GET HTTP request with a missing client token query string parameter.
The affected software is OpenNDS Captive Portal before version 10.1.2.
Yes, a fix is available in version 10.1.2 of OpenNDS Captive Portal.