Description
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
No analysis available yet.
Remediation
Vendor Solution
To remediate this issue, customers on ESM 11.6.x should update to version 11.6.9.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58327 | An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source. |
References
History
Tue, 15 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-10-15T17:41:47.096Z
Reserved: 2023-11-10T05:17:18.636Z
Link: CVE-2023-6071
Updated: 2024-08-02T08:21:17.247Z
Status : Modified
Published: 2023-11-30T13:15:10.293
Modified: 2024-11-21T08:43:05.170
Link: CVE-2023-6071
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD