CVE-2023-1305

An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rapid7:insightappsec:*:*:*:*:self-managed:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:managed:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:saas:*:*:*

History

21 Nov 2024, 07:38

Type Values Removed Values Added
References () https://docs.divvycloud.com/changelog/23321-release-notes - Release Notes () https://docs.divvycloud.com/changelog/23321-release-notes - Release Notes
References () https://nephosec.com/exploiting-rapid7s-insightcloudsec/ - Exploit, Third Party Advisory () https://nephosec.com/exploiting-rapid7s-insightcloudsec/ - Exploit, Third Party Advisory

28 Mar 2023, 16:54

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
References (MISC) https://docs.divvycloud.com/changelog/23321-release-notes - (MISC) https://docs.divvycloud.com/changelog/23321-release-notes - Release Notes
References (MISC) https://nephosec.com/exploiting-rapid7s-insightcloudsec/ - (MISC) https://nephosec.com/exploiting-rapid7s-insightcloudsec/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:saas:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:managed:*:*:*
cpe:2.3:a:rapid7:insightappsec:*:*:*:*:self-managed:*:*:*
CWE NVD-CWE-Other

21 Mar 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-21 17:15

Updated : 2024-11-21 07:38


NVD link : CVE-2023-1305

Mitre link : CVE-2023-1305

CVE.ORG link : CVE-2023-1305


JSON object : View

Products Affected

rapid7

  • insightappsec
  • insightcloudsec
CWE
CWE-653

Insufficient Compartmentalization

NVD-CWE-Other