{"vulnerability": "CVE-2023-0093", "sightings": [{"uuid": "9113c6ac-2ea7-40b1-9312-567830f169b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0093", "type": "seen", "source": "Telegram/23g_wqA5hALgzx7jaJpm9WbnPylRgV-ClL7W0aD7fOqbrXAe", "content": "", "creation_timestamp": "2025-03-08T04:34:11.000000Z"}, {"uuid": "b7964cfd-968c-494b-b01a-4381c8dbb223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0093", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6752", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-0093\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T19:42:29.370Z\n\ud83d\udd17 References:\n1. https://trust.okta.com/security-advisories/okta-advanced-server-access-client-cve-2023-0093/", "creation_timestamp": "2025-03-06T20:34:18.000000Z"}, {"uuid": "d8cc94d5-ea20-4bc9-afd9-26afc355c51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-0093", "type": "seen", "source": "https://t.me/cibsecurity/59515", "content": "\u203c CVE-2023-0093 \u203c\n\nOkta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T00:13:15.000000Z"}]}