{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3097","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-06-05T05:07:49.785Z","datePublished":"2023-06-05T06:00:04.476Z","dateUpdated":"2024-08-02T06:48:07.104Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:38:13.714Z"},"title":"KylinSoft kylin-software-properties setMainSource os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 OS Command Injection"}]}],"affected":[{"vendor":"KylinSoft","product":"kylin-software-properties","versions":[{"version":"n/a","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been rated as critical. This issue affects the function setMainSource. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230687. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in KylinSoft kylin-software-properties für KylinOS ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion setMainSource. Mittels Manipulieren mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 0.0.1-130 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-06-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-06-05T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-06-05T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-06-30T08:27:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Set3r.Pan (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.230687","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.230687","tags":["signature","permissions-required"]},{"url":"https://github.com/i900008/vulndb/blob/main/kylinos_vul2.md","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:48:07.104Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.230687","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.230687","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/i900008/vulndb/blob/main/kylinos_vul2.md","tags":["broken-link","exploit","x_transferred"]}]}]}}