CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
25.6%
The vulnerability affects the endpoint /v2/pkgs/tools/installed
. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request.
Further details are available in the references.
1.3.3
The issue was reported by Nozomi Networks Labs. Further details are available at the following URL:
Vendor | Product | Version | CPE |
---|---|---|---|
arduino | create_agent | * | cpe:2.3:a:arduino:create_agent:*:*:*:*:*:go:*:* |
github.com/advisories/GHSA-4x5q-q7wc-q22p
github.com/arduino/arduino-create-agent/releases/tag/1.3.3
github.com/arduino/arduino-create-agent/security/advisories/GHSA-4x5q-q7wc-q22p
nvd.nist.gov/vuln/detail/CVE-2023-43800
www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide