← Back to CVEs
CVE-2023-32571
CRITICAL9.8
Description
Dynamic Linq 1.0.7.10 through 1.2.25 before 1.3.0 allows attackers to execute arbitrary code and commands when untrusted input to methods including Where, Select, OrderBy is parsed.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published6/22/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
dynamic-linq:linq
Weaknesses (CWE)
CWE-697
References
https://github.com/zzzprojects/System.Linq.Dynamic.Core(cve@mitre.org)
https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/(cve@mitre.org)
https://github.com/zzzprojects/System.Linq.Dynamic.Core(af854a3a-2127-422b-91ae-364da2661108)
https://research.nccgroup.com/2023/06/13/dynamic-linq-injection-remote-code-execution-vulnerability-cve-2023-32571/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.