CVE-2023-40050

Upload profile either through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec check command with maliciously crafted profile allows remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.9
References () https://community.progress.com/s/article/Product-Alert-Bulletin-October-2023-CHEF-Automate-CVE-2023-40050 - Vendor Advisory () https://community.progress.com/s/article/Product-Alert-Bulletin-October-2023-CHEF-Automate-CVE-2023-40050 - Vendor Advisory
References () https://docs.chef.io/automate/profiles/ - Product () https://docs.chef.io/automate/profiles/ - Product
References () https://docs.chef.io/release_notes_automate/ - Release Notes () https://docs.chef.io/release_notes_automate/ - Release Notes

08 Nov 2023, 17:34

Type Values Removed Values Added
References (MISC) https://docs.chef.io/release_notes_automate/ - (MISC) https://docs.chef.io/release_notes_automate/ - Release Notes
References (MISC) https://community.progress.com/s/article/Product-Alert-Bulletin-October-2023-CHEF-Automate-CVE-2023-40050 - (MISC) https://community.progress.com/s/article/Product-Alert-Bulletin-October-2023-CHEF-Automate-CVE-2023-40050 - Vendor Advisory
References (MISC) https://docs.chef.io/automate/profiles/ - (MISC) https://docs.chef.io/automate/profiles/ - Product
First Time Chef
Chef automate
CPE cpe:2.3:a:chef:automate:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-94

31 Oct 2023, 15:35

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-31 15:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-40050

Mitre link : CVE-2023-40050

CVE.ORG link : CVE-2023-40050


JSON object : View

Products Affected

chef

  • automate
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-434

Unrestricted Upload of File with Dangerous Type