{"api_version":"1","generated_at":"2026-04-08T22:40:45+00:00","cve":"CVE-2023-1305","urls":{"html":"https://cve.report/CVE-2023-1305","api":"https://cve.report/api/cve/CVE-2023-1305.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-1305","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-1305"},"summary":{"title":"CVE-2023-1305","description":"An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.","state":"PUBLIC","assigner":"cve@rapid7.com","published_at":"2023-03-21 17:15:00","updated_at":"2023-11-07 04:03:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://docs.divvycloud.com/changelog/23321-release-notes","name":"https://docs.divvycloud.com/changelog/23321-release-notes","refsource":"MISC","tags":[],"title":"23.3.21 Release Notes","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://nephosec.com/exploiting-rapid7s-insightcloudsec/","name":"https://nephosec.com/exploiting-rapid7s-insightcloudsec/","refsource":"MISC","tags":[],"title":"Exploiting Rapid7’s InsightCloudSec – NephōSec","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-1305","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1305","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"1305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rapid7","cpe5":"insightappsec","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"self-managed","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rapid7","cpe5":"insightcloudsec","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"managed","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"1305","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"rapid7","cpe5":"insightcloudsec","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"saas","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-1305","ASSIGNER":"cve@rapid7.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-653: Improper Isolation or Compartmentalization","cweId":"CWE-653"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Rapid7","product":{"product_data":[{"product_name":"InsightCloudSec","version":{"version_data":[{"version_affected":"<=","version_name":"0","version_value":"23.2.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://docs.divvycloud.com/changelog/23321-release-notes","refsource":"MISC","name":"https://docs.divvycloud.com/changelog/23321-release-notes"},{"url":"https://nephosec.com/exploiting-rapid7s-insightcloudsec/","refsource":"MISC","name":"https://nephosec.com/exploiting-rapid7s-insightcloudsec/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","value":"Mike Alfaro of Nephosec"}]},"nvd":{"publishedDate":"2023-03-21 17:15:00","lastModifiedDate":"2023-11-07 04:03:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rapid7:insightappsec:*:*:*:*:self-managed:*:*:*","versionEndExcluding":"23.2.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:managed:*:*:*","versionEndExcluding":"2023.02.01","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:rapid7:insightcloudsec:*:*:*:*:saas:*:*:*","versionEndExcluding":"2023.02.01","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}