### [CVE-2022-1030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1030) ![](https://img.shields.io/static/v1?label=Product&message=Advanced%20Server%20Access%20Client&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen) ### Description Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/mrdominguez/parallel-ssh-scp