// For flags

CVE-2023-51651

Potential URI resolution path traversal in the AWS SDK for PHP

Severity Score

3.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

AWS SDK for PHP is the Amazon Web Services software development kit for PHP. Within the scope of requests to S3 object keys and/or prefixes containing a Unix double-dot, a URI path traversal is possible. The issue exists in the `buildEndpoint` method in the RestSerializer component of the AWS SDK for PHP v3 prior to 3.288.1. The `buildEndpoint` method relies on the Guzzle Psr7 UriResolver utility, which strips dot segments from the request path in accordance with RFC 3986. Under certain conditions, this could lead to an arbitrary object being accessed. This issue has been patched in version 3.288.1.

AWS SDK para PHP es el kit de desarrollo de software de Amazon Web Services para PHP. Dentro del alcance de las solicitudes a claves de objeto S3 y/o prefijos que contienen un doble punto Unix, es posible un path traversal URI. El problema existe en el método `buildEndpoint` en el componente RestSerializer del AWS SDK para PHP v3 anterior a 3.288.1. El método `buildEndpoint` se basa en la utilidad Guzzle Psr7 UriResolver, que elimina segmentos de puntos de la ruta de solicitud de acuerdo con RFC 3986. Bajo ciertas condiciones, esto podría conducir a que se acceda a un objeto arbitrario. Este problema se solucionó en la versión 3.288.1.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-12-20 CVE Reserved
  • 2023-12-22 CVE Published
  • 2023-12-23 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amazon
Search vendor "Amazon"
Aws Software Development Kit
Search vendor "Amazon" for product "Aws Software Development Kit"
< 3.288.1
Search vendor "Amazon" for product "Aws Software Development Kit" and version " < 3.288.1"
php
Affected