{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-38323","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-05-29T15:18:17.653Z","dateReserved":"2023-07-14T00:00:00.000Z","datePublished":"2024-01-26T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2024-01-26T04:51:21.065Z"},"descriptions":[{"lang":"en","value":"An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://openwrt.org/docs/guide-user/services/captive-portal/opennds"},{"url":"https://github.com/openNDS/openNDS/releases/tag/v10.1.3"},{"url":"https://github.com/openNDS/openNDS/blob/master/ChangeLog"},{"url":"https://www.forescout.com/resources/sierra21-vulnerabilities"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:39:12.287Z"},"title":"CVE Program Container","references":[{"url":"https://openwrt.org/docs/guide-user/services/captive-portal/opennds","tags":["x_transferred"]},{"url":"https://github.com/openNDS/openNDS/releases/tag/v10.1.3","tags":["x_transferred"]},{"url":"https://github.com/openNDS/openNDS/blob/master/ChangeLog","tags":["x_transferred"]},{"url":"https://www.forescout.com/resources/sierra21-vulnerabilities","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-08T15:59:00.417378Z","id":"CVE-2023-38323","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-29T15:18:17.653Z"}}]}}