CVE-2023-2273
CVSS V2 None
CVSS V3 None
Description
Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.
Overview
- CVE ID
- CVE-2023-2273
- Assigner
- cve@rapid7.con
- Vulnerability Status
- Received
- Published Version
- 2023-04-26T09:15:09
- Last Modified Date
- 2023-04-26T09:15:09
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://docs.rapid7.com/release-notes/insightagent/20230425/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-2273 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2273 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-26 10:00:51 | Added to TrackCVE | |||
2023-04-26 10:00:51 | Weakness Enumeration | new |