Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability.
The specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1719/ | Third Party Advisory |
Configurations
History
03 Jan 2025, 17:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:arista:ng_firewall:17.1.1:*:*:*:*:*:*:* | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-1719/ - Third Party Advisory | |
First Time |
Arista ng Firewall
Arista |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
20 Dec 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-20 01:15
Updated : 2025-01-03 17:50
NVD link : CVE-2024-12832
Mitre link : CVE-2024-12832
CVE.ORG link : CVE-2024-12832
JSON object : View
Products Affected
arista
- ng_firewall
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')