logo

CVE-2023-43802 github.com/arduino/arduino-create-agent

Package

Manager: go
Name: github.com/arduino/arduino-create-agent
Vulnerable Version: >=0 <1.3.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N

EPSS: 0.0008 pctl0.24348

Details

Arduino Create Agent path traversal - local privilege escalation vulnerability ### Impact The vulnerability affects the endpoint `/upload` which handles request with the `filename` parameter. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can escalate his privileges to those of the user running the Arduino Create Agent service via a crafted HTTP POST request. Further details are available in the references. ### Fixed Version * `1.3.3` ### References The issue was reported by Nozomi Networks Labs. Further details are available at the following URL: * https://www.nozominetworks.com/blog/security-flaws-affect-a-component-of-the-arduino-create-cloud-ide

Metadata

Created: 2023-10-18T18:21:37Z
Modified: 2023-11-02T17:32:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-75j7-w798-cwwx/GHSA-75j7-w798-cwwx.json
CWE IDs: ["CWE-22", "CWE-35"]
Alternative ID: GHSA-75j7-w798-cwwx
Finding: F063
Auto approve: 1