First published: Tue Mar 21 2023(Updated: )
An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 InsightAppSec | <23.2.1 | |
Rapid7 Insightcloudsec | <2023.02.01 | |
Rapid7 Insightcloudsec | <2023.02.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1305 is high with a score of 8.1.
An authenticated attacker can leverage an exposed "box" object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON.
Version 23.2.1 of the Self-Managed version of InsightAppSec, and Managed and SaaS deployments up to version 2023.02.01 of Insightcloudsec.
Yes, the vulnerability was resolved on February 1, 2023, for Managed and SaaS deployments, and in version 23.2.1 of the Self-Managed version of InsightAppSec.
You can find more information about CVE-2023-1305 in the following references: [Link 1](https://docs.divvycloud.com/changelog/23321-release-notes), [Link 2](https://nephosec.com/exploiting-rapid7s-insightcloudsec/)