First published: Mon Jan 29 2024(Updated: )
Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows OS Command Injection. The AppBuilder's Scheduler functionality that facilitates creation of scheduled tasks is vulnerable to command injection. This allows authenticated users to inject arbitrary operating system commands into the executing process. This issue affects AppBuilder: from 21.2 before 23.2.
Credit: security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
OpenText AppBuilder | >=21.2<23.2 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4551 has a high severity level due to its potential for OS command injection.
To remediate CVE-2023-4551, update OpenText AppBuilder to the latest version that addresses this vulnerability.
CVE-2023-4551 affects authenticated users of OpenText AppBuilder versions between 21.2 and 23.2.
CVE-2023-4551 is classified as an improper input validation vulnerability leading to OS command injection.
Yes, CVE-2023-4551 can be exploited by authenticated users to inject arbitrary commands.