lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAM-upGp6smfr60vEJZtXR-9mQACx33wxQWVo3dq69_0DZtfbXA@mail.gmail.com>
Date: Thu, 23 Nov 2023 16:30:03 -0500
From: Kevin <krandall2013@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] CVE-2023-46307

> An issue was discovered in server.js in etcd-browser 87ae63d75260. By
> supplying a /../../../ Directory Traversal input to the URL's GET
> request while connecting to the remote server port specified during
> setup, an attacker can retrieve local operating system files from the
> remote system.
>
> ------------------------------------------
>
> [Vulnerability Type]
> Directory Traversal
>
> ------------------------------------------
>
> [Vendor of Product]
> https://hub.docker.com/r/buddho/etcd-browser
>
> ------------------------------------------
>
> [Affected Product Code Base]
> etcd-browser - Unknown
>
> ------------------------------------------
>
> [Affected Component]
> the server.js file does not validate the path for files.
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [CVE Impact Other]
> Allow for a remote arbitrary user to obtain local operating system files
>
> ------------------------------------------
>
> [Attack Vectors]
> The attacker must supply a /../../ technique to the server application
running on the remote port specified during setup
>
> ------------------------------------------
>
> [Reference]
> https://hub.docker.com/r/buddho/etcd-browser
> https://hub.docker.com/r/buddho/etcd-browser/tags
>
> ------------------------------------------
>
> [Discoverer]
> Kevin Randall
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ