Description
Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.
Affected Software
Related
{"id": "CVE-2023-25345", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2023-25345", "description": "Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.", "published": "2023-03-15T20:15:00", "modified": "2023-03-18T03:50:00", "epss": [{"cve": "CVE-2023-25345", "epss": 0.00087, "percentile": 0.35369, "modified": "2023-06-03"}], "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0}, "severity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-25345", "reporter": "cve@mitre.org", "references": ["https://github.com/node-swig/swig-templates/issues/88"], "cvelist": ["CVE-2023-25345"], "immutableFields": [], "lastseen": "2023-06-03T17:48:03", "viewCount": 21, "enchantments": {"score": {"value": 7.3, "vector": "NONE"}, "dependencies": {"references": [{"type": "github", "idList": ["GHSA-2RQ5-699J-X7P6"]}, {"type": "osv", "idList": ["OSV:GHSA-2RQ5-699J-X7P6"]}, {"type": "veracode", "idList": ["VERACODE:39804"]}]}, "affected_software": {"major_version": [{"name": "swig-templates project swig-templates", "version": 2}, {"name": "swig project swig", "version": 1}]}, "epss": [{"cve": "CVE-2023-25345", "epss": 0.00087, "percentile": 0.35273, "modified": "2023-05-02"}], "vulnersScore": 7.3}, "_state": {"score": 1685814696, "dependencies": 0, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "b8d3c93aee1cb1409d5bffdb37553a8a"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:swig_project:swig:1.4.2", "cpe:/a:swig-templates_project:swig-templates:2.0.4"], "cpe23": ["cpe:2.3:a:swig_project:swig:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:swig-templates_project:swig-templates:2.0.4:*:*:*:*:*:*:*"], "cwe": ["CWE-22"], "affectedSoftware": [{"cpeName": "swig-templates_project:swig-templates", "version": "2.0.4", "operator": "le", "name": "swig-templates project swig-templates"}, {"cpeName": "swig_project:swig", "version": "1.4.2", "operator": "le", "name": "swig project swig"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:swig-templates_project:swig-templates:2.0.4:*:*:*:*:*:*:*", "versionEndIncluding": "2.0.4", "cpe_name": []}, {"vulnerable": true, "cpe23Uri": "cpe:2.3:a:swig_project:swig:1.4.2:*:*:*:*:*:*:*", "versionEndIncluding": "1.4.2", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/node-swig/swig-templates/issues/88", "name": "https://github.com/node-swig/swig-templates/issues/88", "refsource": "MISC", "tags": ["Exploit", "Issue Tracking"]}], "product_info": [{"vendor": "Swig-templates_project", "product": "Swig-templates"}, {"vendor": "Swig_project", "product": "Swig"}], "solutions": [], "workarounds": [], "impacts": [], "problemTypes": [{"descriptions": [{"type": "text", "lang": "en", "description": "n/a"}]}], "exploits": []}
{"osv": [{"lastseen": "2023-03-20T14:06:18", "description": "Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-03-15T21:30:25", "type": "osv", "title": "Arbitrary local file read vulnerability during template rendering ", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2023-25345"], "modified": "2023-03-20T13:59:48", "id": "OSV:GHSA-2RQ5-699J-X7P6", "href": "https://osv.dev/vulnerability/GHSA-2rq5-699j-x7p6", "cvss": {"score": 0.0, "vector": "NONE"}}], "veracode": [{"lastseen": "2023-06-03T20:02:03", "description": "swig-templates is vulnerable to Path Traversal. The vulnerability exists due to improper template restrictions which allows an attacker to access and read the files outside the restricted directory through the `include` or `extends` tags.\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-03-17T01:45:46", "type": "veracode", "title": "Path Traversal", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-25345"], "modified": "2023-03-18T05:36:10", "id": "VERACODE:39804", "href": "https://sca.analysiscenter.veracode.com/vulnerability-database/security/1/1/sid-39804/summary", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "github": [{"lastseen": "2023-06-03T20:12:26", "description": "Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2023-03-15T21:30:25", "type": "github", "title": "Arbitrary local file read vulnerability during template rendering ", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2023-25345"], "modified": "2023-03-20T13:59:52", "id": "GHSA-2RQ5-699J-X7P6", "href": "https://github.com/advisories/GHSA-2rq5-699j-x7p6", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}