First published: Wed Apr 26 2023(Updated: )
Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Rapid7 Insight Agent | <3.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2273 is a vulnerability in Rapid7 Insight Agent token handler versions 3.2.6 and below that allows a Path Traversal attack.
The severity of CVE-2023-2273 is high, with a CVSS score of 7.5.
Rapid7 Insight Agent versions 3.2.6 and below are affected by CVE-2023-2273.
CVE-2023-2273 exploits a Directory Traversal vulnerability, where unsanitized input from a CLI argument is used as a path, allowing an attacker to write arbitrary files.
Yes, it is recommended to upgrade to Rapid7 Insight Agent version 3.3.0 or above to mitigate the vulnerability.