Description

Arista NG Firewall custom_handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the custom_handler method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-24019.

INFO

Published Date :

2024-12-20T00:05:18.862Z

Last Modified :

2024-12-20T17:38:03.994Z

Source :

zdi

Researchers

Following researchers has claimed that they have found this vulnerability.

Mehmet Ince

@mdisec

AFFECTED PRODUCTS

The following products are affected by CVE-2024-12830 vulnerability.

Vendors Products
Arista
  • Ng Firewall
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-12830.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact