In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2682 | In the mtproto_proxy (aka MTProto proxy) component through 0.7.2 for Erlang, a low-privileged remote attacker can access an improperly secured default installation without authenticating and achieve remote command execution ability. |
Github GHSA |
GHSA-738q-mc72-2q22 | MTProto proxy remote code execution vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-18T19:49:40.475Z
Reserved: 2023-10-06T00:00:00
Link: CVE-2023-45312
Updated: 2024-08-02T20:21:15.651Z
Status : Modified
Published: 2023-10-10T21:15:09.680
Modified: 2024-11-21T08:26:43.537
Link: CVE-2023-45312
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA