NA

CVE-2023-33466

Published: 29/06/2023 Updated: 12/09/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Orthanc prior to 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the malicious user to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

orthanc-server orthanc

Vendor Advisories

Debian Bug report logs - #1040597 orthanc: CVE-2023-33466 Package: src:orthanc; Maintainer for src:orthanc is Debian Med Packaging Team <debian-med-packaging@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 7 Jul 2023 19:00:15 UTC Severity: important Tags: security, upstream ...
It was discovered that authenticated API users of Orthanc, a DICOM server for medical imaging, could overwrite arbitrary files and in some setups execute arbitrary code This update backports the option RestApiWriteToFileSystemEnabled, setting it to true in /etc/orthanc/orthancjson restores the previous behaviour For the oldstable distribution (b ...