Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a payload `../../../../../tmp/test111_dev`. This issue has been fixed in version 6.3.5.0.
References
Link | Resource |
---|---|
https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-69j6-crq8-rrhv | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-03-15T17:39:55.532Z
Updated: 2023-03-15T17:39:55.532Z
Reserved: 2023-02-15T16:34:48.772Z
Link: CVE-2023-25804
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-03-15T18:15:10.617
Modified: 2023-03-19T04:00:19.493
Link: CVE-2023-25804
JSON object: View
Redhat Information
No data.
CWE