CVE-2023-0290

Rapid7 Velociraptor directory traversal in client ID parameter

Description

Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.

Remediation

Solution:

  • Upgrade to 0.6.7-5

Category

4.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.24%
Third-Party Advisory github.com
Affected: Rapid7 Velociraptor
Published at:
Updated at:

References

Link Tags
https://github.com/Velocidex/velociraptor product third party advisory

Frequently Asked Questions

What is the severity of CVE-2023-0290?
CVE-2023-0290 has been scored as a medium severity vulnerability.
How to fix CVE-2023-0290?
To fix CVE-2023-0290: Upgrade to 0.6.7-5
Is CVE-2023-0290 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-0290 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-0290?
CVE-2023-0290 affects Rapid7 Velociraptor.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.