Vulnerability Details : CVE-2023-35853
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
Products affected by CVE-2023-35853
- cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-35853
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-35853
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-35853
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2023-35853
-
https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
Comparing suricata-6.0.12...suricata-6.0.13 · OISF/suricata · GitHubVendor Advisory
-
https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da
lua: disable lua rules by default · OISF/suricata@b95bbcc · GitHubPatch;Vendor Advisory
-
https://www.stamus-networks.com/stamus-labs
Stamus Labs | Stamus NetworksNot Applicable
Jump to