106 lines
3.5 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-38316",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-17T06:15:33.617",
"lastModified": "2024-11-21T08:13:18.900",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in OpenNDS Captive Portal before version 10.1.2. When the custom unescape callback is enabled, attackers can execute arbitrary OS commands by inserting them into the URL portion of HTTP GET requests. Affected OpenNDS Captive Portal before version 10.1.2 fixed in OpenWrt master, OpenWrt 23.05 and OpenWrt 22.03 on 28. August 2023 by updating OpenNDS to version 10.1.3."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en OpenNDS Captive Portal antes de la versi\u00f3n 10.1.2. Cuando la devoluci\u00f3n de llamada personalizada sin escape est\u00e1 habilitada, los atacantes pueden ejecutar comandos arbitrarios del sistema operativo insert\u00e1ndolos en la parte URL de las solicitudes HTTP GET."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opennds:captive_portal:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1.2",
"matchCriteriaId": "41C7501E-5FCE-4728-A6DC-9DD6C0468496"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openNDS/openNDS/releases/tag/v10.1.2",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "cve@mitre.org"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/openNDS/openNDS/releases/tag/v10.1.2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://github.com/openwrt/routing/commit/0b19771fb2dd81e7c428759610aed583171eed80",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://source.sierrawireless.com/resources/security-bulletins/sierra-wireless-technical-bulletin---swi-psa-2023-006-v4/#sthash.2vJg3d85.rwx82g1C.dpbs",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}