SB2023021636 - Arbitrary file write in GuardDog



SB2023021636 - Arbitrary file write in GuardDog

Published: February 16, 2023

Security Bulletin ID SB2023021636
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Path traversal (CVE-ID: CVE-2022-23530)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to input validation error when extracting files using the shutil.unpack_archive() function. A remote attacker can pass a specially crafted archive to the application and write files to an arbitrary location on the system.

Successful exploitation of the vulnerability may allows an attacker to compromise the affected system.


Remediation

Install update from vendor's website.