First published: Tue Mar 21 2023(Updated: )
An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 InsightAppSec | <23.2.1 | |
Rapid7 Insightcloudsec | <2023.02.01 | |
Rapid7 Insightcloudsec | <2023.02.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1306
The severity level of CVE-2023-1306 is high, with a value of 8.8.
An authenticated attacker can exploit CVE-2023-1306 by leveraging an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution.
CVE-2023-1306 affects versions up to and exclusive of 23.2.1 of Rapid7 InsightAppSec Self-Managed.
CVE-2023-1306 affects Managed and SaaS deployments of Rapid7 Insightcloudsec up to and exclusive of version 2023.02.01.