HTTP: Softing edgeAggregator Restore Configuration Directory Traversal

This signature detects attempts to exploit a known vulnerability against Softing edgeAggregator. A successful attack can lead to directory traversal and arbitrary code execution.

Extended Description

Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this to execute code in the context of root. Was ZDI-CAN-20543.

Affected Products

Softing edgeaggregator

References

CVE: CVE-2023-38126

Short Name
HTTP:DIR:SOFTING-DIR-TRAVERSAL
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2023-38126 Configuration Directory Restore Softing Traversal edgeAggregator
Release Date
09/06/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3665
False Positive
Unknown
Vendors

Softing

Found a potential security threat?