CVE-2023-48310
CRITICALNC3 Testing Platform < 2.1.1 - Improper Input Validation
Title source: ruleDescription
TestingPlatform is a testing platform for Internet Security Standards. Prior to version 2.1.1, user input is not filtered correctly. Nmap options are accepted. In this particular case, the option to create log files is accepted in addition to a host name (and even without). A log file is created at the location specified. These files are created as root. If the file exists, the existing file is being rendered useless. This can result in denial of service. Additionally, input for scanning can be any CIDR blocks passed to nmap. An attacker can scan 0.0.0.0/0 or even local networks. Version 2.1.1 contains a patch for this issue.
References (4)
Core 4
Core References
Exploit x_refsource_confirm
https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-9fhc-f3mr-w6h6
Vendor Advisory x_refsource_misc
https://github.com/NC3-LU/TestingPlatform/security/advisories/GHSA-mmpf-rw6c-67mm
Patch x_refsource_misc
https://github.com/NC3-LU/TestingPlatform/commit/7b3e7ca869a4845aa7445f874c22c5929315c3a7
Release Notes x_refsource_misc
https://github.com/NC3-LU/TestingPlatform/releases/tag/v2.1.1
Scores
CVSS v3
9.1
EPSS
0.0028
EPSS Percentile
51.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-20
Status
published
Products (1)
nc3/testing_platform
< 2.1.1
Published
Nov 20, 2023
Tracked Since
Feb 18, 2026