Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.
History

Fri, 31 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published:

Updated: 2025-01-31T16:13:24.347Z

Reserved: 2023-04-25T08:45:42.126Z

Link: CVE-2023-2273

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:14.644Z

cve-icon NVD

Status : Modified

Published: 2023-04-26T09:15:09.117

Modified: 2024-11-21T07:58:17.277

Link: CVE-2023-2273

cve-icon Redhat

No data.