CVE-2023-25804
- Reference to the description:
- Description:
- Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a payload `../../../../../tmp/test111_dev`. This issue has been fixed in version 6.3.5.0.
- Last updated date:
- 03/19/2023
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/19/2023
- Reference url to background
https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-69j6-crq8-rrhv