cve/2023/CVE-2023-27588.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-27588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27588)
![](https://img.shields.io/static/v1?label=Product&message=graphql-engine&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-27%3A%20Path%20Traversal%3A%20'dir%2F..%2F..%2Ffilename'&color=brighgreen)
### Description
Hasura is an open-source product that provides users GraphQL or REST APIs. A path traversal vulnerability has been discovered within Hasura GraphQL Engine prior to versions 1.3.4, 2.55.1, 2.20.1, and 2.21.0-beta1. Projects running on Hasura Cloud were not vulnerable. Self-hosted Hasura Projects with deployments that are publicly exposed and not protected by a WAF or other HTTP protection layer should be upgraded to version 1.3.4, 2.55.1, 2.20.1, or 2.21.0-beta1 to receive a patch.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/40826d/advisories