// For flags

CVE-2023-43803

Path traversal in Arduino Create Agent

Severity Score

7.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Arduino Create Agent is a package to help manage Arduino development. This vulnerability affects the endpoint `/v2/pkgs/tools/installed` and the way it handles plugin names supplied as user input. A user who has the ability to perform HTTP requests to the localhost interface, or is able to bypass the CORS configuration, can delete arbitrary files or folders belonging to the user that runs the Arduino Create Agent via a crafted HTTP POST request. This issue has been addressed in version `1.3.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Arduino Create Agent es un paquete para ayudar a gestionar el desarrollo de Arduino. Esta vulnerabilidad afecta el endpoint `/v2/pkgs/tools/installed` y la forma en que maneja los nombres de complementos proporcionados como entrada del usuario. Un usuario que tiene la capacidad de realizar solicitudes HTTP a la interfaz del host local, o que puede omitir la configuración CORS, puede eliminar archivos o carpetas arbitrarios que pertenezcan al usuario que ejecuta Arduino Create Agent a través de una solicitud HTTP POST manipulada. Este problema se solucionó en la versión "1.3.3". Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-09-22 CVE Reserved
  • 2023-10-18 CVE Published
  • 2023-11-03 EPSS Updated
  • 2024-09-12 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Arduino
Search vendor "Arduino"
Create Agent
Search vendor "Arduino" for product "Create Agent"
< 1.3.3
Search vendor "Arduino" for product "Create Agent" and version " < 1.3.3"
go
Affected