Описание
An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Ссылки
- Release Notes
- ExploitThird Party Advisory
- Release Notes
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 23.2.1 (исключая)Версия до 2023.02.01 (исключая)Версия до 2023.02.01 (исключая)
Одно из
cpe:2.3:a:rapid7:insightappsec:*:*:*:*:self-managed:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:managed:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:saas:*:*:*
EPSS
Процентиль: 49%
0.00261
Низкий
8.8 High
CVSS3
Дефекты
CWE-94
CWE-94
Связанные уязвимости
CVSS3: 8.8
github
почти 3 года назад
An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
EPSS
Процентиль: 49%
0.00261
Низкий
8.8 High
CVSS3
Дефекты
CWE-94
CWE-94