2024-12-08 03:06:42 +00:00

88 lines
3.0 KiB
JSON

{
"id": "CVE-2022-44794",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-07T04:15:09.493",
"lastModified": "2024-11-21T07:28:27.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Object First Ootbi BETA build 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in Object First Ootbi BETA build 1.0.13.1611."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en la compilaci\u00f3n 1.0.7.712 de Object First Ootbi BETA. El protocolo de administraci\u00f3n tiene un flujo que permite a un atacante remoto ejecutar c\u00f3digo Bash arbitrario con privilegios de root. El comando que establece el nombre de host no valida los par\u00e1metros de entrada. Como resultado, los datos arbitrarios van directamente al int\u00e9rprete de Bash. Un atacante necesitar\u00eda credenciales para aprovechar esta vulnerabilidad. Esto se solucion\u00f3 en la compilaci\u00f3n 1.0.13.1611 de Object First Ootbi BETA."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:objectfirst:object_first:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.13.1611",
"matchCriteriaId": "5F4D5F6B-0CA9-4A79-9A3D-453783ADA673"
}
]
}
]
}
],
"references": [
{
"url": "https://objectfirst.com/security/of-20221024-0001/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://objectfirst.com/security/of-20221024-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}