CVE-2023-50263

Published: Dic 12, 2023 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2023-0180 Aliases: GHSA-75mc-3pjc-727q, PYSEC-2023-286
ExploitDB:
Other exploit source:
Google Dorks:
LOW 3,7
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none

Description

AI Translation Available

Nautobot is a Network Source of Truth and Network Automation Platform built as a web application atop the Django Python framework with a PostgreSQL or MySQL database. In Nautobot 1.x and 2.0.x prior to 1.6.7 and 2.0.6, the URLs `/files/get/?name=...` and `/files/download/?name=...` are used to provide admin access to files that have been uploaded as part of a run request for a Job that has FileVar inputs. Under normal operation these files are ephemeral and are deleted once the Job in question runs.

In the default implementation used in Nautobot, as provided by `django-db-file-storage`, these URLs do not by default require any user authentication to access; they should instead be restricted to only users who have permissions to view Nautobot's `FileProxy` model instances.

Note that no URL mechanism is provided for listing or traversal of the available file `name` values, so in practice an unauthenticated user would have to guess names to discover arbitrary files for download, but if a user knows the file name/path value, they can access it without authenticating, so we are considering this a vulnerability.

Fixes are included in Nautobot 1.6.7 and Nautobot 2.0.6. No known workarounds are available other than applying the patches included in those versions.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0045
Percentile
0,6th
Updated

EPSS Score Trend (Last 90 Days)

200

Exposure of Sensitive Information to an Unauthorized Actor

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
306

Missing Authentication for Critical Function

Draft
Common Consequences
Security Scopes Affected:
Access Control Other
Potential Impacts:
Gain Privileges Or Assume Identity Varies By Context
Applicable Platforms
Technologies: Cloud Computing, ICS/OT
View CWE Details
Application

Nautobot by Networktocode

Version Range Affected
From 1.1.0 (inclusive)
To 1.6.7 (exclusive)
cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Nautobot by Networktocode

Version Range Affected
From 2.0.0 (inclusive)
To 2.0.6 (exclusive)
cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc…
https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a…
https://github.com/nautobot/nautobot/pull/4959
https://github.com/nautobot/nautobot/pull/4964
https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q
https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/v…
https://github.com/nautobot/nautobot/commit/458280c359a4833a20da294eaf4b8d55edc…
https://github.com/nautobot/nautobot/commit/7c4cf3137f45f1541f09f2f6a7f8850cd3a…
https://github.com/nautobot/nautobot/pull/4959
https://github.com/nautobot/nautobot/pull/4964
https://github.com/nautobot/nautobot/security/advisories/GHSA-75mc-3pjc-727q
https://github.com/victor-o-silva/db_file_storage/blob/master/db_file_storage/v…