Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 08 Nov 2024 09:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 08 Nov 2024 08:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | 
| Weaknesses | CWE-35 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Axis
Published: 2023-10-16T06:24:13.381Z
Updated: 2024-11-08T08:33:59.027Z
Reserved: 2022-11-04T18:30:01.767Z
Link: CVE-2023-21415
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T09:36:34.475Z
 NVD
                        NVD
                    Status : Modified
Published: 2023-10-16T07:15:08.760
Modified: 2024-11-21T07:42:49.053
Link: CVE-2023-21415
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow