Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-29401
HistoryJun 08, 2023 - 12:00 a.m.

CVE-2023-29401

2023-06-0800:00:00
ubuntu.com
ubuntu.com
17
context.fileattachment
filename parameter
content-disposition header
file modification
unix

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

43.4%

The filename parameter of the Context.FileAttachment function is not
properly sanitized. A maliciously crafted filename can cause the
Content-Disposition header to be sent with an unexpected filename value or
otherwise modify the Content-Disposition header. For example, a filename of
“setup.bat";x=.txt” will be sent as a file named “setup.bat”. If the
FileAttachment function is called with names provided by an untrusted
source, this may permit an attacker to cause a file to be served with a
name different than provided. Maliciously crafted attachment file name can
modify the Content-Disposition header.

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

43.4%