A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
References
Link | Resource |
---|---|
https://github.com/facebook/tac_plus/pull/41 | Exploit Patch |
https://github.com/facebook/tac_plus/security/advisories/GHSA-p334-5r3g-4vx3 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4J7ZYMFZB4G4OU5EDJPQLP6F6RKDGIH/ | Mailing List Third Party Advisory |
Configurations
History
19 Sep 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-06 18:15
Updated : 2024-09-19 17:35
NVD link : CVE-2023-45239
Mitre link : CVE-2023-45239
CVE.ORG link : CVE-2023-45239
JSON object : View
Products Affected
fedoraproject
- fedora
- tac_plus
CWE