Okta Advanced Server Access Client for Linux and macOS prior to version 1.58.0 was found to be vulnerable to command injection via a specially crafted URL. An attacker, who has knowledge of a valid team name for the victim and also knows a valid target host where the user has access, can execute commands on the local system.
Max CVSS
9.3
EPSS Score
0.11%
Published
2022-03-23
Updated
2022-04-01
Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL.
Max CVSS
8.8
EPSS Score
0.11%
Published
2022-02-21
Updated
2022-03-01
Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment.
Max CVSS
8.8
EPSS Score
0.10%
Published
2023-03-06
Updated
2023-03-13
A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account.
Max CVSS
8.7
EPSS Score
0.38%
Published
2021-04-02
Updated
2022-05-27
The LDAP Agent Update service with versions prior to 5.18 used an unquoted path, which could allow arbitrary code execution.
Max CVSS
6.7
EPSS Score
0.04%
Published
2023-11-08
Updated
2023-11-16
Imprivata Privileged Access Management (formally Xton Privileged Access Management) 2.3.202112051108 allows XSS.
Max CVSS
5.4
EPSS Score
0.05%
Published
2023-07-20
Updated
2023-08-07
An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL.
Max CVSS
4.7
EPSS Score
0.06%
Published
2023-01-12
Updated
2023-01-30
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!