CVE-2023-1305
CVSS V2 None
CVSS V3 None
Description
An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Overview
- CVE ID
- CVE-2023-1305
- Assigner
- cve@rapid7.con
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-21T17:15:11
- Last Modified Date
- 2023-03-28T16:54:09
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:rapid7:insightappsec:*:*:*:*:self-managed:*:*:* | 1 | OR | 23.2.1 | |
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:managed:*:*:* | 1 | OR | 2023.02.01 | |
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:saas:*:*:* | 1 | OR | 2023.02.01 |
References
Reference URL | Reference Tags |
---|---|
https://docs.divvycloud.com/changelog/23321-release-notes | Release Notes |
https://nephosec.com/exploiting-rapid7s-insightcloudsec/ | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-1305 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1305 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:03:29 | Added to TrackCVE | |||
2023-04-17 03:03:33 | Weakness Enumeration | new |