CVE-2023-2273
Published Apr 26, 2023
Last updated 2 years ago
Overview
- Description
- Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.
- Source
- cve@rapid7.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rapid7:insight_agent:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6C77893-290E-4C86-BA8C-A2667C53145C", "versionEndExcluding": "3.3.0" } ], "operator": "OR" } ] } ]