CVE-2023-5800

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Configurations

Configuration 1 (hide)

cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*
cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*

History

No history.

Information

Published : 2024-02-05 06:15

Updated : 2024-11-21 08:42


NVD link : CVE-2023-5800

Mitre link : CVE-2023-5800

CVE.ORG link : CVE-2023-5800


JSON object : View

Products Affected

axis

  • axis_os_2022
  • axis_os_2020
  • axis_os
CWE
CWE-35

Path Traversal: '.../...//'

CWE-94

Improper Control of Generation of Code ('Code Injection')