cve/2023/CVE-2023-33466.md

21 lines
870 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-33466](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33466)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).
### POC
#### Reference
No PoCs from references.
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/H4lo/awesome-IoT-security-article
2024-05-25 21:48:12 +02:00
- https://github.com/ShielderSec/poc
2024-05-28 08:49:17 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/v3gahax/CVE-2023-33466
2024-05-25 21:48:12 +02:00