Lucene search

K
cvelistRapid7CVELIST:CVE-2023-2273
HistoryApr 26, 2023 - 8:55 a.m.

CVE-2023-2273 Rapid7 Insight Agent Directory Traversal

2023-04-2608:55:36
CWE-22
rapid7
www.cve.org
cve-2023-2273
rapid7 insight agent
directory traversal
path traversal
cli argument
writefile
safe guards

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

20.4%

Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Insight Agent",
    "vendor": "Rapid7",
    "versions": [
      {
        "lessThan": "3.3.0",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

5.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

20.4%

Related for CVELIST:CVE-2023-2273