First published: Fri Jan 26 2024(Updated: )
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opennds Opennds | <10.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38323 is considered a high-severity vulnerability due to its potential for arbitrary OS command execution.
To mitigate CVE-2023-38323, upgrade OpenNDS to version 10.1.3 or later, which addresses the vulnerability.
CVE-2023-38323 affects all OpenNDS versions prior to 10.1.3.
CVE-2023-38323 is a command injection vulnerability due to the failure to sanitize user input in the configuration file.
CVE-2023-38323 allows attackers to execute arbitrary commands on the operating system, which can lead to a complete compromise of the affected system.