CVE-2023-51202

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

27 May 2024, 01:15

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de inyección de comandos del sistema operativo en el procesamiento de comandos o componentes de llamadas al sistema ROS2 (Robot Operating System 2) Foxy Fitzroy, con ROS_VERSION=2 y ROS_PYTHON_VERSION=3 permite a los atacantes ejecutar comandos arbitrarios.
Summary (en) OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. (en) Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
CPE cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*
CWE CWE-78
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/2', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/3', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/4', 'source': 'cve@mitre.org'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/23/5', 'source': 'cve@mitre.org'}
  • {'url': 'https://github.com/16yashpatel/CVE-2023-51202', 'tags': ['Third Party Advisory'], 'source': 'cve@mitre.org'}
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : unknown

01 May 2024, 19:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/5 -

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/3 -

01 May 2024, 17:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/23/2 -
  • () http://www.openwall.com/lists/oss-security/2024/04/23/4 -

17 Apr 2024, 02:15

Type Values Removed Values Added
Summary (en) OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands. (en) OS command injection vulnerability in command processing or system call componentsROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to run arbitrary commands. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability.

08 Feb 2024, 16:04

Type Values Removed Values Added
CPE cpe:2.3:a:openrobotics:robot_operating_system:2:foxy:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-78
References () https://github.com/16yashpatel/CVE-2023-51202 - () https://github.com/16yashpatel/CVE-2023-51202 - Third Party Advisory
First Time Openrobotics
Openrobotics robot Operating System

30 Jan 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-30 22:15

Updated : 2024-05-27 01:15


NVD link : CVE-2023-51202

Mitre link : CVE-2023-51202

CVE.ORG link : CVE-2023-51202


JSON object : View

Products Affected

No product.

CWE

No CWE.