Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-25804
HistoryMar 15, 2023 - 5:39 p.m.

CVE-2023-25804 Roxy-WI vulnerable to Limited Path Traversal in name parameter

2023-03-1517:39:55
CWE-22
GitHub_M
www.cve.org
roxy-wi
web interface
path traversal
haproxy
nginx
apache
keepalived
ssh key
vulnerability
fix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

30.6%

Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the /tmp folder using a payload ../../../../../tmp/test111_dev. This issue has been fixed in version 6.3.5.0.

CNA Affected

[
  {
    "vendor": "hap-wi",
    "product": "roxy-wi",
    "versions": [
      {
        "version": "< 6.3.5.0",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

30.6%

Related for CVELIST:CVE-2023-25804