Page 3 of 11 results (0.001 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 1

A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account. Una vulnerabilidad de inyección de comandos en los parámetros cookieDomain y relayDomain de Okta Access Gateway versiones anteriores a 2020.9.3, permite a atacantes (con acceso de administrador a la interfaz de usuario de Okta Access Gateway) ejecutar comandos del sistema operativo como una cuenta system privilegiada. Okta Access Gateway version 2020.5.5 suffers from multiple authenticated remote root command injection vulnerabilities. • http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html https://www.okta.com/security-advisories/cve-2021-28113 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •