An issue was discovered in Object First Ootbi BETA build 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in Object First Ootbi BETA build 1.0.13.1611.
History

Tue, 24 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Objectfirst ootbi
CPEs cpe:2.3:a:objectfirst:object_first:*:*:*:*:*:*:*:* cpe:2.3:a:objectfirst:ootbi:*:*:*:*:*:*:*:*
Vendors & Products Objectfirst object First
Objectfirst ootbi

Thu, 01 May 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 01 May 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-11-07T00:00:00.000Z

Updated: 2025-05-01T17:42:55.527Z

Reserved: 2022-11-07T00:00:00.000Z

Link: CVE-2022-44794

cve-icon Vulnrichment

Updated: 2024-08-03T14:01:31.361Z

cve-icon NVD

Status : Analyzed

Published: 2022-11-07T04:15:09.493

Modified: 2025-06-24T17:47:44.370

Link: CVE-2022-44794

cve-icon Redhat

No data.