THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2023-4551

Command Injection via Task Scheduler

Assigner:OpenText (f81092c5-7f14-476d-80dc-24857f90be84)
Reserved:2023-08-25
Published:2024-01-29
Updated:2024-06-10

Description

Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows OS Command Injection. The AppBuilder's Scheduler functionality that facilitates creation of scheduled tasks is vulnerable to command injection. This allows authenticated users to inject arbitrary operating system commands into the executing process. This issue affects AppBuilder: from 21.2 before 23.2.



HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

23.2
unaffected

21.2 before 23.2
affected

Credits

George Mathias finder

References

https://support.opentext.com/csm?id=ot_kb_search&kb_category=61648712db61781068cfd6c4e296197b

cve.org CVE-2023-4551

nvd.nist.gov CVE-2023-4551

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-4551