Lucene search

K
osvGoogleOSV:GHSA-VHM8-WWRF-3GCW
HistoryMar 13, 2023 - 8:52 p.m.

Path Traversal Vulnerability in `LESS` Parser allows reading of sensitive server files

2023-03-1320:52:11
Google
osv.dev
5
less parser
path traversal
sensitive files
server
vulnerability
absolute path
exploit
version 1.7
admin accounts
file permissions
access controls

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

29.5%

Impact

If an admin account has already been compromised by an attacker, the LESS parser can be exploited to read sensitive files on the server through the use of path traversal techniques.

An attacker can achieve this by providing an absolute path to a sensitive file in the custom LESS setting, which the LESS parser will then read. For example, an attacker could use the following code to read the contents of the /etc/passwd file:

@import (inline) '/etc/passwd';

.test {
  content: data-uri('/etc/passwd');
}

Patches

The vulnerability has been addressed in version 1.7. Users should upgrade to this version to mitigate the vulnerability.

Workarounds

Users can mitigate the vulnerability by ensuring that their admin accounts are secured with strong passwords and other best practices for account security. Additionally, users can limit the exposure of sensitive files on the server by implementing appropriate file permissions and access controls.

6.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L

0.001 Low

EPSS

Percentile

29.5%

Related for OSV:GHSA-VHM8-WWRF-3GCW