CVE-2023-33466

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-33466
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-33466.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-33466
Related
Published
2023-06-29T15:15:09Z
Modified
2024-09-18T03:23:48.315487Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).

References

Affected packages

Debian:11 / orthanc

Package

Name
orthanc
Purl
pkg:deb/debian/orthanc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.9.2+really1.9.1+dfsg-1+deb11u1

Affected versions

1.*

1.9.2+really1.9.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / orthanc

Package

Name
orthanc
Purl
pkg:deb/debian/orthanc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.1+dfsg-2+deb12u1

Affected versions

1.*

1.10.1+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / orthanc

Package

Name
orthanc
Purl
pkg:deb/debian/orthanc?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.1+dfsg-1

Affected versions

1.*

1.10.1+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}