First published: Mon Jun 19 2023(Updated: )
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oisf Suricata | <6.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue in Suricata is CVE-2023-35852.
The severity of CVE-2023-35852 is high with a severity value of 7.5.
Suricata versions up to exclusive 6.0.13 are affected by CVE-2023-35852.
An adversary who controls an external source of rules can exploit the vulnerability in Suricata by triggering absolute or relative directory traversal, leading to write access to a local filesystem.
The vulnerability in Suricata is addressed in version 6.0.13 by requiring allow-absolute-f...