Description
In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2682 | In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability. |
Github GHSA |
GHSA-738q-mc72-2q22 | MTProto proxy remote code execution vulnerability |
References
History
Wed, 18 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-18T19:49:40.475Z
Reserved: 2023-10-06T00:00:00.000Z
Link: CVE-2023-45312
Updated: 2024-08-02T20:21:15.651Z
Status : Modified
Published: 2023-10-10T21:15:09.680
Modified: 2024-11-21T08:26:43.537
Link: CVE-2023-45312
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA