Vulnerability Details : CVE-2023-5834
HashiCorp Vagrant's Windows installer targeted a custom location with a non-protected path that could be junctioned, introducing potential for unauthorized file system writes. Fixed in Vagrant 2.4.0.
Products affected by CVE-2023-5834
- cpe:2.3:a:hashicorp:vagrant:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-5834
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5834
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
3.8
|
LOW | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N |
2.0
|
1.4
|
HashiCorp Inc. |
CWE ids for CVE-2023-5834
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
-
The product opens a file or directory, but it does not properly prevent the name from being associated with a junction or mount point to a destination that is outside of the intended control sphere.Assigned by: security@hashicorp.com (Secondary)
References for CVE-2023-5834
-
https://discuss.hashicorp.com/t/hcsec-2023-31-vagrant-s-windows-installer-allowed-directory-junction-write/59568
HCSEC-2023-31 - Vagrant’s Windows Installer Allowed Directory Junction Write - Security - HashiCorp DiscussVendor Advisory
Jump to