In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
References
Link | Resource |
---|---|
https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da | Patch Vendor Advisory |
https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13 | Vendor Advisory |
https://www.stamus-networks.com/stamus-labs | Not Applicable |
Configurations
History
No history.
Information
Published : 2023-06-19 04:15
Updated : 2023-06-28 18:45
NVD link : CVE-2023-35853
Mitre link : CVE-2023-35853
CVE.ORG link : CVE-2023-35853
JSON object : View
Products Affected
oisf
- suricata
CWE