CVE-2023-5800

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Configurations

Configuration 1 (hide)

cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*
cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*

History

21 Nov 2024, 08:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 5.4
References () https://www.axis.com/dam/public/89/d9/99/cve-2023-5800-en-US-424339.pdf - Vendor Advisory () https://www.axis.com/dam/public/89/d9/99/cve-2023-5800-en-US-424339.pdf - Vendor Advisory

08 Nov 2024, 09:15

Type Values Removed Values Added
Summary (en) Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. (en) Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CWE CWE-35

13 Feb 2024, 00:37

Type Values Removed Values Added
CPE cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*
cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*
cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 8.8
CWE CWE-94
First Time Axis
Axis axis Os
Axis axis Os 2020
Axis axis Os 2022
References () https://www.axis.com/dam/public/89/d9/99/cve-2023-5800-en-US-424339.pdf - () https://www.axis.com/dam/public/89/d9/99/cve-2023-5800-en-US-424339.pdf - Vendor Advisory

05 Feb 2024, 13:54

Type Values Removed Values Added
Summary
  • (es) Vintage, miembro del programa AXIS OS Bug Bounty, descubrió que la API VAPIX create_overlay.cgi no tenía una validación de entrada suficiente que permitiera una posible ejecución remota de código. Esta falla solo puede explotarse después de autenticarse con una cuenta de servicio con privilegios de operador o administrador. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener más información y soluciones.

05 Feb 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 06:15

Updated : 2024-11-21 08:42


NVD link : CVE-2023-5800

Mitre link : CVE-2023-5800

CVE.ORG link : CVE-2023-5800


JSON object : View

Products Affected

axis

  • axis_os
  • axis_os_2022
  • axis_os_2020
CWE
CWE-35

Path Traversal: '.../...//'

CWE-94

Improper Control of Generation of Code ('Code Injection')