logo

CVE-2023-43800 github.com/arduino/arduino-create-agent

Package

Manager: go
Name: github.com/arduino/arduino-create-agent
Vulnerable Version: >=0 <1.3.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00031 pctl0.07313

Details

Arduino Create Agent Insufficient Verification of Data Authenticity vulnerability ### Impact The vulnerability affects the endpoint `/v2/pkgs/tools/installed`. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. Further details are available in the references. ### Fixed Version * `1.3.3` ### References The issue was reported by Nozomi Networks Labs. Further details are available at the following URL: * https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide

Metadata

Created: 2023-10-18T15:54:26Z
Modified: 2023-11-02T17:33:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-4x5q-q7wc-q22p/GHSA-4x5q-q7wc-q22p.json
CWE IDs: ["CWE-345"]
Alternative ID: GHSA-4x5q-q7wc-q22p
Finding: F204
Auto approve: 1