8.8
CVE-2023-1306
- EPSS 0.26%
- Veröffentlicht 21.03.2023 17:15:11
- Zuletzt bearbeitet 26.02.2025 17:15:15
- Quelle cve@rapid7.com
- CVE-Watchlists
- Unerledigt
An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rapid7 ≫ Insightappsec SwEditionself-managed Version < 23.2.1
Rapid7 ≫ Insightcloudsec SwEditionmanaged Version < 2023.02.01
Rapid7 ≫ Insightcloudsec SwEditionsaas Version < 2023.02.01
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.26% | 0.491 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.