CVE-2017-5229

All editions of Rapid7 Metasploit prior to version 4.13.0-2017020701 contain a directory traversal vulnerability in the Meterpreter extapi Clipboard.parse_dump() function. By using a specially-crafted build of Meterpreter, it is possible to write to an arbitrary directory on the Metasploit console with the permissions of the running Metasploit instance.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rapid7:metasploit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:27

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96954 - () http://www.securityfocus.com/bid/96954 -
References () https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products - Mitigation, Vendor Advisory () https://community.rapid7.com/community/infosec/blog/2017/03/01/multiple-vulnerabilities-affecting-four-rapid7-products - Mitigation, Vendor Advisory

Information

Published : 2017-03-02 20:59

Updated : 2024-11-21 03:27


NVD link : CVE-2017-5229

Mitre link : CVE-2017-5229

CVE.ORG link : CVE-2017-5229


JSON object : View

Products Affected

rapid7

  • metasploit
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')