Vulnerability Description
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oisf | Suricata | < 6.0.13 |
Related Weaknesses (CWE)
References
- https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17Patch
- https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335Patch
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13Vendor Advisory
- https://www.stamus-networks.com/stamus-labsNot Applicable
- https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17Patch
- https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335Patch
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/03/msg00029.html
- https://www.stamus-networks.com/stamus-labsNot Applicable
FAQ
What is CVE-2023-35852?
CVE-2023-35852 is a vulnerability with a CVSS score of 7.5 (HIGH). In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and l...
How severe is CVE-2023-35852?
CVE-2023-35852 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-35852?
Check the references section above for vendor advisories and patch information. Affected products include: Oisf Suricata.