Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-34060
HistoryMay 23, 2024 - 12:01 p.m.

CVE-2024-34060 Arbitrary File Write in IRIS EVTX Pipeline

2024-05-2312:01:39
CWE-22
GitHub_M
www.cve.org
arbitrary file write
iris evtx pipeline
remote code execution
server side template injection
vulnerability
patched
version 1.0.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

10.5%

IrisEVTXModule is an interface module for Evtx2Splunk and Iris in order to ingest Microsoft EVTX log files. The iris-evtx-module is a pipeline plugin of iris-web that processes EVTX files through IRIS web application. During the upload of an EVTX through this pipeline, the filename is not safely handled and may cause an Arbitrary File Write. This can lead to a remote code execution (RCE) when combined with a Server Side Template Injection (SSTI). This vulnerability has been patched in version 1.0.0.

CNA Affected

[
  {
    "vendor": "dfir-iris",
    "product": "iris-evtx-module",
    "versions": [
      {
        "version": "< 1.0.0",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

10.5%

Related for CVELIST:CVE-2024-34060