{ "schema_version": "1.4.0", "id": "GHSA-m5hg-m5vh-mqwx", "modified": "2025-06-24T18:33:07Z", "published": "2022-11-07T12:00:34Z", "aliases": [ "CVE-2022-44794" ], "details": "An issue was discovered in Object First 1.0.7.712. Management protocol has a flow which allows a remote attacker to execute arbitrary Bash code with root privileges. The command that sets the hostname doesn't validate input parameters. As a result, arbitrary data goes directly to the Bash interpreter. An attacker would need credentials to exploit this vulnerability. This is fixed in 1.0.13.1611.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44794" }, { "type": "WEB", "url": "https://objectfirst.com/security/of-20221024-0001" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-07T04:15:00Z" } }