First published: Fri Jan 26 2024(Updated: )
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opennds Opennds | <10.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38318 is classified as a high-severity vulnerability due to the potential for arbitrary OS command execution.
To fix CVE-2023-38318, upgrade OpenNDS to version 10.1.3 or later, which addresses this vulnerability.
CVE-2023-38318 is a command injection vulnerability caused by improper sanitization of the gateway FQDN entry in the configuration file.
CVE-2023-38318 affects all versions of OpenNDS prior to version 10.1.3.
Yes, CVE-2023-38318 can be exploited by attackers with either direct or indirect access to the configuration file.