Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-2273
HistoryApr 26, 2023 - 9:15 a.m.

Path traversal

2023-04-2609:15:00
PRIOn knowledge base
www.prio-n.com
1
rapid7 insight agent
path traversal
directory traversal
vulnerability
version 3.2.6
input sanitization
writefile
path
attacker
arbitrary files
remediated
version 3.3.0

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.

CPENameOperatorVersion
insight_agentlt3.3.0

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

Related for PRION:CVE-2023-2273