In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
References
Configurations
History
28 Jun 2023, 18:44
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13 - Vendor Advisory | |
References | (MISC) https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17 - Patch | |
References | (MISC) https://www.stamus-networks.com/stamus-labs - Not Applicable | |
References | (MISC) https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335 - Patch |
19 Jun 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-19 04:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-35852
Mitre link : CVE-2023-35852
CVE.ORG link : CVE-2023-35852
JSON object : View
Products Affected
oisf
- suricata
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')