We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-4551

Command Injection via Task Scheduler



Description

Improper Input Validation vulnerability in OpenText AppBuilder on Windows, Linux allows OS Command Injection. The AppBuilder's Scheduler functionality that facilitates creation of scheduled tasks is vulnerable to command injection. This allows authenticated users to inject arbitrary operating system commands into the executing process. This issue affects AppBuilder: from 21.2 before 23.2.

Reserved 2023-08-25 | Published 2024-01-29 | Updated 2024-08-02 | Assigner OpenText


HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

23.2
unaffected

21.2 before 23.2
affected

Credits

George Mathias finder

References

support.opentext.com/...ory=61648712db61781068cfd6c4e296197b

cve.org (CVE-2023-4551)

nvd.nist.gov (CVE-2023-4551)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-4551

Support options

Helpdesk Chat, Email, Knowledgebase