First published: Mon Jun 19 2023(Updated: )
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oisf Suricata | <6.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-35853.
The severity of CVE-2023-35853 is critical with a score of 9.8.
The affected software is Suricata before version 6.0.13.
An adversary who controls an external source of Lua rules may be able to execute Lua code.
The vulnerability is addressed in version 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.