Path Traversal Vulnerability in Roxy-WI (Versions prior to 6.3.5.0)

Path Traversal Vulnerability in Roxy-WI (Versions prior to 6.3.5.0)

CVE-2023-25804 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a payload `../../../../../tmp/test111_dev`. This issue has been fixed in version 6.3.5.0.

Learn more about our Cis Benchmark Audit For Apache Http Server.