Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33779 | Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal. |
| Link | Providers |
|---|---|
| https://docs.rapid7.com/release-notes/insightagent/20230425/ |
|
Fri, 31 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: rapid7
Published:
Updated: 2025-01-31T16:13:24.347Z
Reserved: 2023-04-25T08:45:42.126Z
Link: CVE-2023-2273
Updated: 2024-08-02T06:19:14.644Z
Status : Modified
Published: 2023-04-26T09:15:09.117
Modified: 2024-11-21T07:58:17.277
Link: CVE-2023-2273
No data.
OpenCVE Enrichment
No data.
EUVD