CVE-2023-35852

Name
CVE-2023-35852
Description
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://www.stamus-networks.com/stamus-labs
MISC https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
MISC https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335
MISC https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:* suricata >= None < 6.0.13

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
suricata 3.18-community 6.0.12-r0 Steve McMaster <code@mcmaster.io> possibly vulnerable