CVE-2023-35852Path Traversal in Suricata

CWE-22Path Traversal5 documents5 sources
Severity
7.5HIGHNVD
EPSS
0.9%
top 24.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 19

Description

In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDoisf/suricata< 6.0.13
Debianoisf/suricata< 1:6.0.1-3+deb11u1+2

Patches

🔴Vulnerability Details

3
CVEList
CVE-2023-35852: In Suricata before 62023-06-19
GHSA
GHSA-747h-x2cf-7vm7: In Suricata before 62023-06-19
OSV
CVE-2023-35852: In Suricata before 62023-06-19

📋Vendor Advisories

1
Debian
CVE-2023-35852: suricata - In Suricata before 6.0.13 (when there is an adversary who controls an external s...2023
CVE-2023-35852 — Path Traversal in Oisf Suricata | cvebase