{"id":"CVE-2023-35852","details":"In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.","modified":"2026-04-02T09:06:29.056686Z","published":"2023-06-19T04:15:11.217Z","references":[{"type":"WEB","url":"https://www.stamus-networks.com/stamus-labs"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00029.html"},{"type":"ADVISORY","url":"https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13"},{"type":"FIX","url":"https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17"},{"type":"FIX","url":"https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/oisf/suricata","events":[{"introduced":"0"},{"fixed":"f09a6b562ec7f28f512e156d103284fa910307a1"},{"fixed":"735f5aa9ca3b28cfacc7a443f93a44387fbacf17"},{"fixed":"aee1523b4591430ebed1ded0bb95508e6717a335"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"6.0.13"}]}}],"versions":["suricata-0.8.2","suricata-1.0.0","suricata-1.0.1","suricata-1.0.2","suricata-1.0.3","suricata-1.0.4","suricata-1.0.5","suricata-1.1","suricata-1.1.1","suricata-1.1beta1","suricata-1.1beta2","suricata-1.1beta3","suricata-1.1rc1","suricata-1.2","suricata-1.2.1","suricata-1.2beta1","suricata-1.2rc1","suricata-1.3","suricata-1.3.1","suricata-1.3.2","suricata-1.3.3","suricata-1.3.4","suricata-1.3.5","suricata-1.3.6","suricata-1.3beta1","suricata-1.3beta2","suricata-1.3rc1","suricata-1.4","suricata-1.4.1","suricata-1.4.2","suricata-1.4.3","suricata-1.4.4","suricata-1.4.5","suricata-1.4.6","suricata-1.4.7","suricata-1.4beta1","suricata-1.4beta2","suricata-1.4beta3","suricata-1.4rc1","suricata-2.0","suricata-2.0.1","suricata-2.0.10","suricata-2.0.11","suricata-2.0.1rc1","suricata-2.0.2","suricata-2.0.3","suricata-2.0.4","suricata-2.0.5","suricata-2.0.6","suricata-2.0.7","suricata-2.0.8","suricata-2.0.9","suricata-2.0beta1","suricata-2.0beta2","suricata-2.0rc1","suricata-2.0rc2","suricata-2.0rc3","suricata-2.1beta1","suricata-2.1beta2","suricata-2.1beta3","suricata-2.1beta4","suricata-3.0","suricata-3.0.1","suricata-3.0.1RC1","suricata-3.0.2","suricata-3.0RC1","suricata-3.0RC2","suricata-3.0RC3","suricata-3.1","suricata-3.1.1","suricata-3.1.2","suricata-3.1.3","suricata-3.1.4","suricata-3.1RC1","suricata-3.2","suricata-3.2.1","suricata-3.2.2","suricata-3.2.3","suricata-3.2.4","suricata-3.2.5","suricata-3.2RC1","suricata-3.2beta1","suricata-4.0.0","suricata-4.0.0-beta1","suricata-4.0.0-rc1","suricata-4.0.0-rc2","suricata-4.0.1","suricata-4.0.2","suricata-4.0.3","suricata-4.0.4","suricata-4.0.5","suricata-4.0.6","suricata-4.0.7","suricata-4.1.0","suricata-4.1.0-beta1","suricata-4.1.0-rc1","suricata-4.1.0-rc2","suricata-4.1.1","suricata-4.1.10","suricata-4.1.2","suricata-4.1.3","suricata-4.1.4","suricata-4.1.5","suricata-4.1.6","suricata-4.1.7","suricata-4.1.8","suricata-4.1.9","suricata-5.0.0","suricata-5.0.0-beta1","suricata-5.0.0-rc1","suricata-5.0.1","suricata-5.0.10","suricata-5.0.2","suricata-5.0.3","suricata-5.0.4","suricata-5.0.5","suricata-5.0.6","suricata-5.0.7","suricata-5.0.8","suricata-5.0.9","suricata-6.0.0","suricata-6.0.0-beta1","suricata-6.0.0-rc1","suricata-6.0.1","suricata-6.0.10","suricata-6.0.11","suricata-6.0.12","suricata-6.0.2","suricata-6.0.3","suricata-6.0.4","suricata-6.0.5","suricata-6.0.6","suricata-6.0.7","suricata-6.0.8","suricata-6.0.9","suricata-7.0.0","suricata-7.0.0-beta1","suricata-7.0.0-rc1","suricata-7.0.0-rc2","suricata-7.0.1","suricata-7.0.10","suricata-7.0.11","suricata-7.0.12","suricata-7.0.13","suricata-7.0.14","suricata-7.0.15","suricata-7.0.2","suricata-7.0.3","suricata-7.0.4","suricata-7.0.5","suricata-7.0.6","suricata-7.0.7","suricata-7.0.8","suricata-7.0.9","suricata-8.0.0","suricata-8.0.0-beta1","suricata-8.0.0-rc1","suricata-8.0.1","suricata-8.0.2","suricata-8.0.3","suricata-8.0.4"],"database_specific":{"vanir_signatures":[{"digest":{"threshold":0.9,"line_hashes":["91333645308053670368847096290587367607","143631006118128134772191325553239776243"]},"deprecated":false,"signature_type":"Line","target":{"file":"src/util-path.h"},"source":"https://github.com/oisf/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335","id":"CVE-2023-35852-3122e1c3","signature_version":"v1"},{"digest":{"length":392,"function_hash":"232504511668407682734497967485675524051"},"deprecated":false,"signature_type":"Function","target":{"function":"SetupSavePath","file":"src/detect-dataset.c"},"source":"https://github.com/oisf/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335","id":"CVE-2023-35852-4a10b4c6","signature_version":"v1"},{"digest":{"threshold":0.9,"line_hashes":["292825715875766719558095166696891383116","112445470504447632973598486319071788523","192033792265391434051360999334508772553"]},"deprecated":false,"signature_type":"Line","target":{"file":"src/detect-dataset.c"},"source":"https://github.com/oisf/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17","id":"CVE-2023-35852-66c28f19","signature_version":"v1"},{"digest":{"threshold":0.9,"line_hashes":["96951223880122559125563562755350548834","46242836851346384173233262018738423764","107398881970566090360551169625629666050","144748704519576399632295292518218480910","319055725507430203323111239742250211794"]},"deprecated":false,"signature_type":"Line","target":{"file":"src/detect-dataset.c"},"source":"https://github.com/oisf/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335","id":"CVE-2023-35852-af8dbdd3","signature_version":"v1"},{"digest":{"length":795,"function_hash":"189849624587947544729395227541359798084"},"deprecated":false,"signature_type":"Function","target":{"function":"SetupSavePath","file":"src/detect-dataset.c"},"source":"https://github.com/oisf/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17","id":"CVE-2023-35852-c70a7780","signature_version":"v1"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-35852.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}