An issue was discovered in Object First Ootbi BETA build 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in Object First Ootbi BETA build 1.0.13.1611.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-11-07T00:00:00

Updated: 2023-03-17T00:00:00

Reserved: 2022-11-07T00:00:00


Link: CVE-2022-44794

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-11-07T04:15:09.493

Modified: 2023-03-17T21:15:10.937


Link: CVE-2022-44794

JSON object: View

cve-icon Redhat Information

No data.