cve/2023/CVE-2023-3313.md

19 lines
979 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3313)
![](https://img.shields.io/static/v1?label=Product&message=Enterprise%20Security%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.6.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen)
### Description
An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.
### POC
#### Reference
- https://kcm.trellix.com/corporate/index?page=content&id=SB10403
2024-06-09 00:33:16 +00:00
- https://kcm.trellix.com/corporate/index?page=content&id=SB10403
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.