CVE-2023-43802 – github.com/arduino/arduino-create-agent
Package
Manager: go
Name: github.com/arduino/arduino-create-agent
Vulnerable Version: >=0 <1.3.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.0008 pctl0.24348
Details
Arduino Create Agent path traversal - local privilege escalation vulnerability ### Impact The vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. Further details are available in the references. ### Fixed Version * `1.3.3` ### References The issue was reported by Nozomi Networks Labs. Further details are available at the following URL: * https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide
Metadata
Created: 2023-10-18T18:21:37Z
Modified: 2023-11-02T17:32:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-75j7-w798-cwwx/GHSA-75j7-w798-cwwx.json
CWE IDs: ["CWE-22", "CWE-35"]
Alternative ID: GHSA-75j7-w798-cwwx
Finding: F063
Auto approve: 1