cve/2023/CVE-2023-3313.md

18 lines
912 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3313)
![](https://img.shields.io/static/v1?label=Product&message=Enterprise%20Security%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.6.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.
### POC
#### Reference
- https://kcm.trellix.com/corporate/index?page=content&id=SB10403
#### Github
No PoCs found on GitHub currently.