Name | CVE-2023-33466 |
Description | Orthanc before 1.12.0 allows authenticated users with access to the Orthanc API to overwrite arbitrary files on the file system, and in specific deployment scenarios allows the attacker to overwrite the configuration, which can be exploited to trigger Remote Code Execution (RCE). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3562-1, DSA-5473-1 |
Debian Bugs | 1040597 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
orthanc (PTS) | bullseye (security), bullseye | 1.9.2+really1.9.1+dfsg-1+deb11u1 | fixed |
| bookworm, bookworm (security) | 1.10.1+dfsg-2+deb12u1 | fixed |
| sid, trixie | 1.12.4+dfsg-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://discourse.orthanc-server.org/t/security-advisory-for-orthanc-deployments-running-versions-before-1-12-0/3568
Requires the addition of a new RestApiWriteToFileSystemEnabled configuration and
a check in ExportInstanceFile (OrthancRestResources.cpp); the default value
could/work break behaviour.