CVE-2023-29246: Apache OpenMeetings vulnerable to remote code execution via null-bye injection
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.20425%
CWE
Published
5/12/2023
Updated
11/4/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.openmeetings:openmeetings-parent | maven | >= 2.0.0, < 7.1.0 | 7.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper input validation in configuration path handling. The patches introduced a new Configuration.Type.PATH and validation logic (Path.of()) to sanitize these inputs. The pre-patch code in ConfigForm.java's onSaveSubmit method did not validate paths, and ImportInitvalues.java incorrectly assigned the STRING type to path configurations. These functions directly processed attacker-controlled path values without proper sanitization, allowing null-byte injection to bypass validation and execute arbitrary commands.