mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
64 lines
3.4 KiB
JSON
64 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2023-48643",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-05-16T16:15:08.437",
|
|
"lastModified": "2024-11-21T08:32:10.197",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Shrubbery tac_plus 2.x, 3.x. and 4.x through F4.0.4.28 allows unauthenticated Remote Command Execution. The product allows users to configure authorization checks as shell commands through the tac_plus.cfg configuration file. These are executed when a client sends an authorization request with a username that has pre-authorization directives configured. However, it is possible to inject additional commands into these checks because strings from TACACS+ packets are used as command-line arguments. If the installation lacks a a pre-shared secret (there is no pre-shared secret by default), then the injection can be triggered without authentication. (The attacker needs to know a username configured to use a pre-authorization command.) NOTE: this is related to CVE-2023-45239 but the issue is in the original Shrubbery product, not Meta's fork."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Shrubbery tac_plus 2.x, 3.x. y 4.x hasta F4.0.4.28 permite la ejecuci\u00f3n de comandos remotos no autenticados. El producto permite a los usuarios configurar comprobaciones de autorizaci\u00f3n como comandos de shell a trav\u00e9s del archivo de configuraci\u00f3n tac_plus.cfg. Estos se ejecutan cuando un cliente env\u00eda una solicitud de autorizaci\u00f3n con un nombre de usuario que tiene directivas de autorizaci\u00f3n previa configuradas. Sin embargo, es posible inyectar comandos adicionales en estas comprobaciones porque las cadenas de los paquetes TACACS+ se utilizan como argumentos de la l\u00ednea de comandos. Si la instalaci\u00f3n carece de un secreto previamente compartido (no hay ning\u00fan secreto previamente compartido de forma predeterminada), entonces la inyecci\u00f3n se puede activar sin autenticaci\u00f3n. (El atacante necesita conocer un nombre de usuario configurado para usar un comando de autorizaci\u00f3n previa). NOTA: esto est\u00e1 relacionado con CVE-2023-45239, pero el problema est\u00e1 en el producto Shrubbery original, no en la bifurcaci\u00f3n de Meta."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-94"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/takeshixx/tac_plus-pre-auth-rce",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://github.com/takeshixx/tac_plus-pre-auth-rce",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |