through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec
check command with maliciously crafted profile allows remote code execution.
No analysis available yet.
Vendor Solution
Solution (optional): Customers should adopt the latest releases of Automate available from the customer downloads portal.
Vendor Workaround
Workaround (optional): Chef recommends all users to manually inspect and lint with a tool similar to test-kitchen all profiles and cookbooks prior to usage in production.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44657 | Upload profile either through API or user interface in Chef Automate prior to and including version 4.10.29 using InSpec check command with maliciously crafted profile allows remote code execution. |
No history.
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-09-06T15:41:14.418Z
Reserved: 2023-08-08T19:44:41.112Z
Link: CVE-2023-40050
Updated: 2024-08-02T18:24:54.691Z
Status : Modified
Published: 2023-10-31T15:15:09.227
Modified: 2024-11-21T08:18:36.260
Link: CVE-2023-40050
No data.
OpenCVE Enrichment
No data.
EUVD