CVE ID: CVE-2023-49329
Title: Anomali Match Application OS Command Injection Vulnerability
Vendor: Anomali Inc.
Product: Anomali Match
Version: All versions prior to 4.6.2, 4.5.4, and 4.4.5 respectively
Vulnerability Type: Authenticated OS Command Injection
An OS Command Injection vulnerability has been identified in the Anomali Match application, allowing an authenticated admin user to inject and execute operating system commands. The vulnerability arises from improper handling of untrusted input within the application, enabling an attacker to elevate privileges, execute operating system commands, and potentially compromise the underlying operating system.
Successful exploitation of this vulnerability can lead to the following consequences:
- Unauthorized access to sensitive Anomali Match application and server
- Execution of arbitrary operating system commands.
- Potential compromise of the underlying operating system.
- Privilege escalation within the application.
Anomali Inc. has released a security patch to address this vulnerability versioned 4.6.2, 4.5.4 and 4.4.5. It is highly recommended that all affected users upgrade to the latest patched version of the Anomali Match application as soon as possible. Additionally, users are advised to follow security best practices, including:
- Limit access to trusted personnel and minimize administrative privileges.
- Monitor system logs and network traffic for suspicious activities.
- Conduct regular security assessments and penetration testing to identify and address vulnerabilities proactively.
This vulnerability was responsibly disclosed by Mr. Abdulmalik Aljurayyad of Saudi Aramco on May 18, 2023.