First published: Fri Jan 26 2024(Updated: )
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the network interface name entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opennds Opennds | <10.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38317 is considered a critical vulnerability due to its ability to allow arbitrary OS command execution.
To fix CVE-2023-38317, you should upgrade OpenNDS to version 10.1.3 or later.
CVE-2023-38317 affects all versions of OpenNDS prior to 10.1.3.
CVE-2023-38317 can potentially be exploited by attackers with direct or indirect access to the configuration file.
The consequences of CVE-2023-38317 include the possibility of an attacker executing arbitrary commands on the operating system.