
Cloud Vulnerability DB
A community-led vulnerabilities database
A command injection vulnerability (CVE-2022-48583) was discovered in the dashboard scheduler feature of ScienceLogic SL1 versions 11.1.2 and earlier. The vulnerability was disclosed on August 9, 2023, and affects the core platform functionality (Securifera Advisory).
The vulnerability exists due to improper handling of user-controlled input in the dashboard scheduler feature, where unsanitized input is passed directly to a shell command. This implementation flaw is categorized as CWE-78 (OS Command Injection). The vulnerability has been assigned a CVSS v3.1 score of 8.8 (High), with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (Securifera Advisory).
Successful exploitation of this vulnerability allows attackers to inject arbitrary commands to the underlying operating system, potentially leading to complete system compromise with the ability to execute unauthorized commands (CISA Bulletin).
Users are advised to update to the latest version of ScienceLogic SL1 that addresses this vulnerability (Securifera Advisory).
The disclosure process involved significant resistance from the vendor, who initially refused CVE issuance and disclosure. The vendor hired a law firm to manage the disclosure process, and their legal team strongly advised against disclosing to MITRE. The vulnerability was finally disclosed after extended negotiations (Securifera Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."