Huawei EulerOS: Security Advisory for librsvg2, directory traversal vulnerabilit
Reporter | Title | Published | Views | Family All 57 |
---|---|---|---|---|
![]() | CVE-2023-38633 | 22 Jul 202317:15 | – | alpinelinux |
![]() | AlmaLinux 9 : librsvg2 (ALSA-2023:5081) | 14 Sep 202300:00 | – | nessus |
![]() | Oracle Linux 9 : librsvg2 (ELSA-2023-5081) | 13 Sep 202300:00 | – | nessus |
![]() | RHEL 9 : librsvg2 (RHSA-2023:5081) | 12 Sep 202300:00 | – | nessus |
![]() | SUSE SLES15 / openSUSE 15 Security Update : librsvg (SUSE-SU-2023:3208-1) | 8 Aug 202300:00 | – | nessus |
![]() | Fedora 38 : librsvg2 (2023-fc79ee273d) | 4 Aug 202300:00 | – | nessus |
![]() | EulerOS 2.0 SP11 : librsvg2 (EulerOS-SA-2023-3012) | 16 Jan 202400:00 | – | nessus |
![]() | RHEL 9 : librsvg2 (RHSA-2023:4809) | 29 Aug 202300:00 | – | nessus |
![]() | Amazon Linux 2023 : librsvg2, librsvg2-devel, librsvg2-tools (ALAS2023-2023-295) | 24 Aug 202300:00 | – | nessus |
![]() | Debian DSA-5484-1 : librsvg - security update | 27 Aug 202300:00 | – | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2023.3012");
script_cve_id("CVE-2023-38633");
script_tag(name:"creation_date", value:"2023-10-31 04:19:09 +0000 (Tue, 31 Oct 2023)");
script_version("2024-02-05T14:36:57+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:57 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:S/C:C/I:N/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-08-16 19:41:52 +0000 (Wed, 16 Aug 2023)");
script_name("Huawei EulerOS: Security Advisory for librsvg2 (EulerOS-SA-2023-3012)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=(EULEROS\-2\.0SP11|EULEROSVIRT\-2\.9\.0)");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2023-3012");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2023-3012");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'librsvg2' package(s) announced via the EulerOS-SA-2023-3012 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href='.?../../../../../../../../../../etc/passwd' in an xi:include element.(CVE-2023-38633)");
script_tag(name:"affected", value:"'librsvg2' package(s) on Huawei EulerOS V2.0SP11.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP11") {
if(!isnull(res = isrpmvuln(pkg:"librsvg2", rpm:"librsvg2~2.50.5~2.h1.eulerosv2r11", rls:"EULEROS-2.0SP11"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"librsvg2-help", rpm:"librsvg2-help~2.50.5~2.h1.eulerosv2r11", rls:"EULEROS-2.0SP11"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
if(release == "EULEROSVIRT-2.9.0") {
if(!isnull(res = isrpmvuln(pkg:"python3-scipy", rpm:"python3-scipy~1.2.2~2.h5.eulerosv2r9", rls:"EULEROSVIRT-2.9.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo