Vulnerability Description
Command Injection vulnerability in OpenWB 1.6 and 1.7 allows remote attackers to run arbitrary commands via crafted GET request.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openwb | Openwb | 1.6 |
Related Weaknesses (CWE)
References
- https://eldstal.se/advisories/230329-openwb.htmlExploitMitigationThird Party Advisory
- https://github.com/snaptec/openWB/issues/2672ExploitIssue TrackingMitigation
- https://github.com/snaptec/openWB/pull/2673Patch
- https://eldstal.se/advisories/230329-openwb.htmlExploitMitigationThird Party Advisory
- https://github.com/snaptec/openWB/issues/2672ExploitIssue TrackingMitigation
- https://github.com/snaptec/openWB/pull/2673Patch
FAQ
What is CVE-2023-30261?
CVE-2023-30261 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Command Injection vulnerability in OpenWB 1.6 and 1.7 allows remote attackers to run arbitrary commands via crafted GET request.
How severe is CVE-2023-30261?
CVE-2023-30261 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-30261?
Check the references section above for vendor advisories and patch information. Affected products include: Openwb Openwb.