A vulnerability has been found in the dyndisc example scripts (naptr-eduroam.sh, radsec-dynsrv.sh) provided with radsecproxy. For details, see https://github.com/radsecproxy/radsecproxy/security/advisories/GHSA-56gw-9rj...
Updated example scripts are provided with the 1.9.0 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually.
Best regards, Fabian
-- SWITCH Fabian Mauchle, Network Engineer Werdstrasse 2, P.O. Box, 8021 Zurich, Switzerland Phone +41 44 268 15 30, direct +41 44 268 15 39