Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-43801
HistoryOct 18, 2023 - 9:06 p.m.

CVE-2023-43801 Path traversal in Arduino Create Agent

2023-10-1821:06:12
CWE-22
GitHub_M
www.cve.org
4
arduino create agent
cve-2023-43801
path traversal
vulnerability
http request
cors configuration
upgrade

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

EPSS

0.001

Percentile

25.6%

Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint /v2/pkgs/tools/installed and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP DELETE request. This issue has been addressed in version 1.3.3. Users are advised to upgrade. There are no known workarounds for this issue.

CNA Affected

[
  {
    "vendor": "arduino",
    "product": "arduino-create-agent",
    "versions": [
      {
        "version": "< 1.3.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

EPSS

0.001

Percentile

25.6%

Related for CVELIST:CVE-2023-43801