Arbitrary Command Execution Vulnerability in Wazuh by Open Source Vendor
CVE-2023-50260
8.8HIGH
What is CVE-2023-50260?
An improper validation flaw within the host_deny script of Wazuh enables attackers to inject arbitrary commands into the /etc/hosts.deny file. This vulnerability exploits the active response feature, which allows automated actions based on alerts. By manipulating the host_deny script, an attacker can execute unauthorized commands with root privileges on both the server and agent systems. The issue is present in Wazuh versions up to 4.7.1 and has been resolved in version 4.7.2. Organizations using affected versions should take immediate action to mitigate potential risks from this vulnerability.
References
EPSS Score
15% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
