First published: Mon Oct 09 2023(Updated: )
Wazuh is a security detection, visibility, and compliance open source project. In versions 4.4.0 and 4.4.1, it is possible to get the Wazuh API administrator key used by the Dashboard using the browser development tools. This allows a logged user to the dashboard to become administrator of the API, even if their dashboard role is not. Version 4.4.2 contains a fix. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wazuh Dashboard | >=4.4.0<4.4.2 | |
Wazuh | >=4.4.0<4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42455 is a vulnerability in the Wazuh open source project that allows a logged-in user to the dashboard to become the administrator of the Wazuh API.
The severity of CVE-2023-42455 is high with a CVSS score of 8.8.
CVE-2023-42455 allows an attacker with logged-in access to the dashboard to gain administrator privileges for the Wazuh API.
Versions 4.4.0 to 4.4.2 of Wazuh Dashboard and Wazuh Kibana App are affected by CVE-2023-42455.
Yes, you can find references for CVE-2023-42455 at the following links: [Wazuh Dashboard Plugins Issue #5427](https://github.com/wazuh/wazuh-dashboard-plugins/issues/5427), [Wazuh Kibana App Pull Request #5428](https://github.com/wazuh/wazuh-kibana-app/pull/5428), [Wazuh Kibana App Advisory GHSA-8w7x-52r7-qvjf](https://github.com/wazuh/wazuh-kibana-app/security/advisories/GHSA-8w7x-52r7-qvjf).