A directory traversal vulnerability in the Captive Portal templates of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary system commands as root via a crafted ZIP archive.
References
Link | Resource |
---|---|
https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2 | Patch |
https://logicaltrust.net/blog/2023/08/opnsense.html | Exploit Third Party Advisory |
https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2 | Patch |
https://logicaltrust.net/blog/2023/08/opnsense.html | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-08-09 19:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38997
Mitre link : CVE-2023-38997
CVE.ORG link : CVE-2023-38997
JSON object : View
Products Affected
opnsense
- opnsense
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')