CVE-2023-35852
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
19/06/2023
Last modified:
03/11/2025
Description
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:* | 6.0.13 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17
- https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
- https://www.stamus-networks.com/stamus-labs
- https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17
- https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
- https://lists.debian.org/debian-lts-announce/2025/03/msg00029.html
- https://www.stamus-networks.com/stamus-labs



