Page 3 of 25 results (0.014 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation. En Suricata antes de la versión 6.0.13 (cuando hay un adversario que controla una fuente externa de reglas), un nombre de archivo de conjunto de datos, que proviene de una regla, puede desencadenar el salto de directorios absolutos o relativos, y conducir al acceso de escritura a un sistema de archivos local. Esto se soluciona en 6.0.13 requiriendo "allow-absolute-filenames" y "allow-write" (en la sección de configuración de reglas de conjuntos de datos) si una instalación requiere saltar/escribir en esta situación. • https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17 https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335 https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13 https://www.stamus-networks.com/stamus-labs • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section. En Suricata antes de la versión 6.0.13, un adversario que controle una fuente externa de reglas Lua puede ser capaz de ejecutar código Lua. Esto se soluciona en la versión 6.0.13 deshabilitando Lua a menos que "allow-rules" sea verdadero en la sección de configuración de seguridad de Lua. • https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13 https://www.stamus-networks.com/stamus-labs •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

Directory Traversal vulnerability found in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1 allows a remote attacker to obtain sensitive information via the file parameter to suricata/suricata_logs_browser.php. • http://www.2ngon.com/2015/01/lfi-vulnerability-suricata-146-pkg-v101.html https://github.com/pfsense/pfsense-packages/commit/59ed3438729fd56452f58a0f79f0c288db982ac3 https://pastebin.com/8dj59053 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. • https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df https://github.com/OISF/suricata/releases https://redmine.openinfosecfoundation.org/issues/4710 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments. Suricata versiones anteriores a 5.0.8 y versiones 6.x anteriores a 6.0.4, permite una evasión de TCP por medio de un cliente con una pila TCP/IP diseñada que puede enviar una determinada secuencia de segmentos • https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 https://github.com/OISF/suricata/releases https://redmine.openinfosecfoundation.org/issues/4569 • CWE-787: Out-of-bounds Write •