First published: Fri Dec 20 2024(Updated: )
Arista NG Firewall ReportEntry SQL Injection Arbitrary File Read and Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files and disclose sensitive information on affected installations of Arista NG Firewall. Authentication is required to exploit this vulnerability. The specific flaw exists within the ReportEntry class. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the www-data user. Was ZDI-CAN-24325.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arista Edge Threat Management - Arista NG Firewall | ||
Arista Edge Threat Management - Arista NG Firewall | =17.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12832 is assessed as a critical vulnerability due to its ability to allow remote attackers to manipulate files and disclose sensitive information.
To fix CVE-2024-12832, ensure that your Arista NG Firewall is updated to the latest version that addresses the vulnerability.
CVE-2024-12832 affects Arista NG Firewall version 17.1.1 and potentially other versions if they are vulnerable.
CVE-2024-12832 allows for SQL injection attacks that can lead to arbitrary file read and write on affected systems.
Yes, authentication is required to exploit the CVE-2024-12832 vulnerability in Arista NG Firewall.