GHSA-w36g-q975-37rg

Suggest an improvement
Source
https://github.com/advisories/GHSA-w36g-q975-37rg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-w36g-q975-37rg/GHSA-w36g-q975-37rg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-w36g-q975-37rg
Aliases
Published
2021-03-18T19:30:20Z
Modified
2023-11-08T04:05:22.404105Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Improper Input Validation (RCE)
Details

Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.

Database specific
{
    "github_reviewed_at": "2021-03-12T22:48:12Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "nvd_published_at": "2021-03-06T02:15:00Z",
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / wazuh

Package

Affected ranges

Type
SEMVER
Events
Introduced
4.0.0
Fixed
4.0.4

Database specific

{
    "last_known_affected_version_range": "<= 4.0.3"
}