CVE-2023-46307
2023-11-28 04:38:0 Author: seclists.org(查看原文) 阅读量:13 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Kevin <krandall2013 () gmail com>
Date: Thu, 23 Nov 2023 16:30:03 -0500

An issue was discovered in server.js in etcd-browser 87ae63d75260. By
supplying a /../../../ Directory Traversal input to the URL's GET
request while connecting to the remote server port specified during
setup, an attacker can retrieve local operating system files from the
remote system.

------------------------------------------

[Vulnerability Type]
Directory Traversal

------------------------------------------

[Vendor of Product]
https://hub.docker.com/r/buddho/etcd-browser

------------------------------------------

[Affected Product Code Base]
etcd-browser - Unknown

------------------------------------------

[Affected Component]
the server.js file does not validate the path for files.

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[Impact Information Disclosure]
true

------------------------------------------

[CVE Impact Other]
Allow for a remote arbitrary user to obtain local operating system files

------------------------------------------

[Attack Vectors]
The attacker must supply a /../../ technique to the server application
running on the remote port specified during setup

------------------------------------------

[Reference]
https://hub.docker.com/r/buddho/etcd-browser
https://hub.docker.com/r/buddho/etcd-browser/tags

------------------------------------------

[Discoverer]
Kevin Randall
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • CVE-2023-46307 Kevin (Nov 27)
    • <Possible follow-ups>
    • CVE-2023-46307 Kevin (Nov 27)

文章来源: https://seclists.org/fulldisclosure/2023/Nov/11
如有侵权请联系:admin#unsafe.sh