CVE-2020-19678
Suricata vulnerability analysis and mitigation

Overview

Directory Traversal vulnerability was discovered in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1. The vulnerability allows remote attackers to obtain sensitive information via the file parameter to suricata/suricatalogsbrowser.php (NVD).

Technical details

The vulnerability is classified as a Directory Traversal (CWE-22) with a CVSS v3.1 Base Score of 7.5 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). The issue exists in the file parameter handling of suricatalogsbrowser.php, where insufficient validation allows traversal outside the intended directory structure (Pastebin).

Impact

The vulnerability allows attackers to read arbitrary files on the server through the web browser. This includes access to sensitive system files such as /etc/master.passwd, potentially exposing critical system information and credentials (Pastebin).

Mitigation and workarounds

A patch was released that fixes the file browser vulnerability in the LOGS BROWSER tab. The fix includes proper validation of file paths and is available through a security update (Github Patch).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management