Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-38997: Services: Captive Portal - safeguard template overlay distribution. · opnsense/core@448762d

A directory traversal vulnerability in the Captive Portal templates of OPNsense before 23.7 allows attackers to execute arbitrary system commands as root via a crafted ZIP archive.

CVE
#vulnerability

Expand Up @@ -40,15 +40,15 @@ cnf = Config() zoneid = sys.argv[1] target_directory = ‘/var/captiveportal/zone%s/htdocs/’ % zoneid template_data = cnf.fetch_template_data(sys.argv[1]) template_data = cnf.fetch_template_data(zoneid) if template_data is not None and len(template_data) > 20: print (‘overlay user template package for zone %s’ % zoneid) zip_content = base64.b64decode(template_data) input_data = BytesIO(zip_content) with zipfile.ZipFile(input_data, mode=’r’, compression=zipfile.ZIP_DEFLATED) as zf_in: for zf_info in zf_in.infolist(): if zf_info.filename[-1] != '/’: target_filename = ‘%s%s’ % (target_directory, zf_info.filename) target_filename = ‘%s%s’ % (target_directory, zf_info.filename) if os.path.realpath(target_filename).startswith(target_directory): file_target_directory = '/’.join(target_filename.split(‘/’)[:-1]) if not os.path.isdir(file_target_directory): os.makedirs(file_target_directory) Expand Down

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda