CVE-2023-1306

An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rapid7:insightappsec:*:*:*:*:self-managed:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:managed:*:*:*
cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:saas:*:*:*

History

07 Nov 2023, 04:03

Type Values Removed Values Added
Summary An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec. An authenticated attacker can leverage an exposed resource.db() accessor method to smuggle Python method calls via a Jinja template, which can lead to code execution. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.

Information

Published : 2023-03-21 17:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-1306

Mitre link : CVE-2023-1306

CVE.ORG link : CVE-2023-1306


JSON object : View

Products Affected

rapid7

  • insightappsec
  • insightcloudsec
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')