<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security Advisories on Velociraptor - Digging deeper!</title>
    <link>https://www.velociraptor-docs.org/announcements/advisories/</link>
    <description>Recent content in Security Advisories on Velociraptor - Digging deeper!</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="https://www.velociraptor-docs.org/announcements/advisories/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2025-14728 Velociraptor directory traversal vulnerability</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2025-14728/</link>
      <pubDate>Sat, 20 Dec 2025 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2025-14728/</guid>
      <description>&#xA;&lt;div class=&#34;cve&#34;&gt;&#xA;  &lt;p&gt;&#xA;    &lt;span&gt;Published&#xA;    &lt;/span&gt;on 2025-12-29&#xA;  &lt;/p&gt;&#xA;  &lt;p&gt;&#xA;  &lt;/p&gt;&#xA;  &lt;details class=&#34;popup&#34;&gt;&#xA;    &lt;summary class=&#34;lbl rnd sec CVSS MEDIUM&#34;&gt;CVSS · MEDIUM · 6.8&#xA;      &lt;sub&gt;⁄10&#xA;      &lt;/sub&gt;&#xA;      &lt;span style=&#34;font-size:0px;opacity:0&#34;&gt; · CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#xA;      &lt;/span&gt;&#xA;    &lt;/summary&gt;&#xA;    &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&#xA;      &lt;span&gt;Scoring scenario:&#xA;      &lt;/span&gt;GENERAL&#xA;      &lt;div&gt;attackVector:&#xA;        &lt;b&gt;NETWORK&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;attackComplexity:&#xA;        &lt;b&gt;HIGH&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;privilegesRequired:&#xA;        &lt;b&gt;NONE&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;userInteraction:&#xA;        &lt;b&gt;NONE&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;scope:&#xA;        &lt;b&gt;CHANGED&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;confidentialityImpact:&#xA;        &lt;b&gt;NONE&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;integrityImpact:&#xA;        &lt;b&gt;HIGH&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;availabilityImpact:&#xA;        &lt;b&gt;NONE&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;&#xA;        &lt;a class=&#34;vgi-dial&#34; href=&#34;https://cvss.js.org/#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N&#34; target=&#34;_blank&#34;&gt;Open CVSS Calc&#xA;        &lt;/a&gt;&#xA;      &lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/details&gt;&#xA;  &lt;p&gt;&#xA;  &lt;/p&gt;&#xA;  &lt;div id=&#34;description&#34;&gt;&#xA;    &lt;p&gt;Rapid7 Velociraptor versions before 0.75.6 contain a directory&#xA;      traversal issue on Linux servers that allows a rogue client to&#xA;      upload a file which is written outside the datastore&#xA;      directory. Velociraptor is normally only allowed to write in the&#xA;      datastore directory. The issue occurs due to insufficient&#xA;      sanitization of directory names which end with a &#34;.&#34;, only&#xA;      encoding the final &#34;.&#34; as &#34;%2E&#34;.&#xA;      &lt;br&gt;&#xA;      &lt;br&gt;Although files can be written to incorrect locations, the&#xA;      containing directory must end with &#34;%2E&#34;. This limits the impact&#xA;      of this vulnerability, and prevents it from overwriting critical&#xA;      files.&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;configs&#34;&gt;&#xA;    &lt;h2&gt;Required configuration for exposure:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;This vulnerability only occurs on Velociraptor servers running&#xA;    on Linux (which is the common and recommended&#xA;    configuration). Velociraptor servers running on Windows are not&#xA;    affected.&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;problem&#34;&gt;&#xA;    &lt;h2&gt;Problem:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;CWE-22 Improper Limitation of a Pathname to a Restricted Directory (&#39;Path Traversal&#39;)&#xA;      &lt;a href=&#34;https://cwe.mitre.org/data/definitions/22.html&#34; target=&#34;_blank&#34;&gt;&#xA;        &lt;small&gt;CWE-22&#xA;        &lt;/small&gt;&#xA;      &lt;/a&gt;&#xA;      &lt;br&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;impact&#34;&gt;&#xA;    &lt;h2&gt;Impact:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;CAPEC-23 File Content Injection&#xA;      &lt;a href=&#34;https://capec.mitre.org/data/definitions/23&#34; target=&#34;_blank&#34;&gt;&#xA;        &lt;small&gt;CAPEC-23&#xA;        &lt;/small&gt;&#xA;      &lt;/a&gt;&#xA;      &lt;br&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;status&#34;&gt;&#xA;    &lt;h2&gt;Product Status:&#xA;    &lt;/h2&gt;&#xA;    &lt;table class=&#34;striped&#34;&gt;&#xA;      &lt;colgroup&gt;&#xA;        &lt;col&gt;&#xA;        &lt;col class=&#34;affectedCol&#34;&gt;&#xA;      &lt;/colgroup&gt;&#xA;      &lt;thead&gt;&#xA;        &lt;tr&gt;&#xA;          &lt;th&gt;Product&#xA;          &lt;/th&gt;&#xA;          &lt;th&gt;Affected&#xA;          &lt;/th&gt;&#xA;        &lt;/tr&gt;&#xA;      &lt;/thead&gt;&#xA;      &lt;tbody&gt;&#xA;        &lt;tr&gt;&#xA;          &lt;td rowspan=&#34;1&#34;&gt;&#xA;            &lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&#xA;            &lt;/b&gt;&#xA;            &lt;i&gt; on&#xA;            &lt;/i&gt;&#xA;            &lt;span class=&#34;vgi-stack&#34;&gt;Linux&#xA;            &lt;/span&gt;&#xA;            &lt;br&gt;&#xA;            &lt;a class=&#34;vgi-ext&#34; href=&#34;https://github.com/Velocidex/velociraptor&#34;&gt;source repo&#xA;            &lt;/a&gt;&#xA;            &lt;br&gt;&#xA;            &lt;span class=&#34;vgi-impact&#34;&gt;Default status is unaffected&#xA;            &lt;/span&gt;&#xA;          &lt;/td&gt;&#xA;          &lt;td&gt; before 0.75.6&#xA;            &lt;br&gt;&#xA;          &lt;/td&gt;&#xA;        &lt;/tr&gt;&#xA;      &lt;/tbody&gt;&#xA;    &lt;/table&gt;&#xA;    &lt;br style=&#34;font-size:0;&#34;&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;    &lt;h2&gt;Credits:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;We thank &lt;a href=&#34;https://x.com/_chebuya&#34;&gt;@_chebuya&lt;/a&gt; for&#xA;    identifying and reporting this issue&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;references&#34;&gt;&#xA;    &lt;h2&gt;References&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;&#xA;    &lt;/p&gt;&#xA;    &lt;div&gt;&#xA;      &lt;a href=&#34;https://docs.velociraptor.app/announcements/advisories/cve-2025-14728/&#34;&gt;docs.velociraptor.app/announcements/advisories/cve-2025-14728/&#xA;      &lt;/a&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;p&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;&lt;h2 id=&#34;further-details&#34;&gt;Further details&lt;/h2&gt;&#xA;&lt;p&gt;When Velociraptor receives an uploaded file from the client, the&#xA;server writes the file into the client&amp;rsquo;s part of the datastore&#xA;directory. The path under which the file is written is made to&#xA;resemble the original path on the client as much as possible, except&#xA;that certain characters are escaped.&lt;/p&gt;&#xA;&lt;p&gt;For example, if the path contains a &amp;ldquo;:&amp;rdquo; character (e.g. &lt;code&gt;C:\Windows&lt;/code&gt;)&#xA;this is escaped since this character is not representable on a Windows&#xA;filesystem. Additionally, velociraptor escapes directory traversal&#xA;sequences like &lt;code&gt;..&lt;/code&gt;.&lt;/p&gt;&#xA;&lt;p&gt;On Windows, filenames that end with a &amp;ldquo;.&amp;rdquo; are not representable, with&#xA;windows silently dropping the final &amp;ldquo;.&amp;rdquo; from the filename. This causes&#xA;&lt;a href=&#34;https://github.com/Velocidex/velociraptor/pull/1348&#34; target=&#34;_blank&#34; &gt;corruption when the server runs on&#xA;Windows&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;In the specific case of a path component that ends with a &amp;ldquo;.&amp;rdquo;,&#xA;Velociraptor escapes the final &amp;ldquo;.&amp;rdquo; to &amp;ldquo;%2E&amp;rdquo;, but neglects to escape&#xA;other directory traversal characters in that path component. This&#xA;results in some directory traversal characters being propagated into&#xA;the path itself.&lt;/p&gt;&#xA;&lt;p&gt;The vulnerability allows a rogue client to upload files to unintended&#xA;directories on the server, as long as the containing directory name&#xA;ends with a &amp;ldquo;%2E&amp;rdquo;.&lt;/p&gt;&#xA;&lt;p&gt;On Windows, Velociraptor uses raw device paths which do not support&#xA;directory traversal at all. Therefore, this vulnerability is not&#xA;exploitable on&#xA;Windows. (e.g. &lt;code&gt;\\?\C:\datastore\clients\C.1234\..\test.txt&lt;/code&gt; is not a&#xA;valid path)&lt;/p&gt;&#xA;&lt;h2 id=&#34;recommendation&#34;&gt;Recommendation&lt;/h2&gt;&#xA;&lt;p&gt;This vulnerability requires upgrading the server as described in&#xA;&lt;a href=&#34;https://www.velociraptor-docs.org/docs/deployment/server/upgrades/&#34;&gt;Server Upgrades&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;On Windows the vulnerability is not exploitable.&lt;/li&gt;&#xA;&lt;li&gt;If running the 0.75 release on a Linux server, please use the&#xA;&lt;a href=&#34;https://www.velociraptor-docs.org/downloads/&#34;&gt;velociraptor-v0.75.6-linux-amd64&lt;/a&gt;&#xA;release.&lt;/li&gt;&#xA;&lt;li&gt;If running the 0.74 release on a Linux server, please use the&#xA;&lt;a href=&#34;https://www.velociraptor-docs.org/downloads/previous_downloads/&#34;&gt;velociraptor-v0.74.6-linux-amd64&lt;/a&gt;&#xA;release.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Older versions are vulnerable and should be upgraded immediately.&lt;/p&gt;&#xA;</description>
    </item>
    <item>
      <title>CVE-2025-6264 Velociraptor priviledge escalation via UpdateConfig artifact</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2025-6264/</link>
      <pubDate>Wed, 18 Jun 2025 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2025-6264/</guid>
      <description>&#xA;&lt;div class=&#34;cve&#34;&gt;&#xA;  &lt;p&gt;&#xA;    &lt;span&gt;Published&#xA;    &lt;/span&gt;on 2025-06-19&#xA;  &lt;/p&gt;&#xA;  &lt;p&gt;&#xA;  &lt;/p&gt;&#xA;  &lt;details class=&#34;popup&#34;&gt;&#xA;    &lt;summary class=&#34;lbl rnd sec CVSS MEDIUM&#34;&gt;CVSS · MEDIUM · 5.5&#xA;      &lt;sub&gt;⁄10&#xA;      &lt;/sub&gt;&#xA;      &lt;span style=&#34;font-size:0px;opacity:0&#34;&gt; · CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L&#xA;      &lt;/span&gt;&#xA;    &lt;/summary&gt;&#xA;    &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&#xA;      &lt;span&gt;Scoring scenario:&#xA;      &lt;/span&gt;GENERAL&#xA;      &lt;div&gt;attackVector:&#xA;        &lt;b&gt;NETWORK&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;attackComplexity:&#xA;        &lt;b&gt;HIGH&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;privilegesRequired:&#xA;        &lt;b&gt;HIGH&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;userInteraction:&#xA;        &lt;b&gt;NONE&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;scope:&#xA;        &lt;b&gt;CHANGED&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;confidentialityImpact:&#xA;        &lt;b&gt;LOW&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;integrityImpact:&#xA;        &lt;b&gt;LOW&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;availabilityImpact:&#xA;        &lt;b&gt;LOW&#xA;        &lt;/b&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div&gt;&#xA;        &lt;a class=&#34;vgi-dial&#34; href=&#34;https://cvss.js.org/#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L&#34; target=&#34;_blank&#34;&gt;Open CVSS Calc&#xA;        &lt;/a&gt;&#xA;      &lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/details&gt;&#xA;  &lt;p&gt;&#xA;  &lt;/p&gt;&#xA;  &lt;div id=&#34;description&#34;&gt;&#xA;    &lt;p&gt;Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.&amp;nbsp; To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.&#xA;      &lt;br&gt;&#xA;      &lt;br&gt;The Admin.Client.UpdateClientConfig is an artifact used to update the client&#39;s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the &#34;Investigator&#34; role) to collect it from endpoints and update the configuration.&#xA;      &lt;br&gt;&#xA;      &lt;br&gt;This can lead to arbitrary command execution and endpoint takeover.&#xA;      &lt;br&gt;&#xA;      &lt;br&gt;To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the &#34;Investigator&#39; role).&amp;nbsp;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;configs&#34;&gt;&#xA;    &lt;h2&gt;Required configuration for exposure:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;Users who rely on artifacts to prevent dangerous actions from already privileged users.&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;problem&#34;&gt;&#xA;    &lt;h2&gt;Problem:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;CWE-276 Incorrect Default Permissions&#xA;      &lt;a href=&#34;https://cwe.mitre.org/data/definitions/276&#34; target=&#34;_blank&#34;&gt;&#xA;        &lt;small&gt;CWE-276&#xA;        &lt;/small&gt;&#xA;      &lt;/a&gt;&#xA;      &lt;br&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;impact&#34;&gt;&#xA;    &lt;h2&gt;Impact:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;CAPEC-23 File Content Injection&#xA;      &lt;a href=&#34;https://capec.mitre.org/data/definitions/23&#34; target=&#34;_blank&#34;&gt;&#xA;        &lt;small&gt;CAPEC-23&#xA;        &lt;/small&gt;&#xA;      &lt;/a&gt;&#xA;      &lt;br&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;status&#34;&gt;&#xA;    &lt;h2&gt;Product Status:&#xA;    &lt;/h2&gt;&#xA;    &lt;table class=&#34;striped&#34;&gt;&#xA;      &lt;colgroup&gt;&#xA;        &lt;col&gt;&#xA;        &lt;col class=&#34;affectedCol&#34;&gt;&#xA;      &lt;/colgroup&gt;&#xA;      &lt;thead&gt;&#xA;        &lt;tr&gt;&#xA;          &lt;th&gt;Product&#xA;          &lt;/th&gt;&#xA;          &lt;th&gt;Affected&#xA;          &lt;/th&gt;&#xA;        &lt;/tr&gt;&#xA;      &lt;/thead&gt;&#xA;      &lt;tbody&gt;&#xA;        &lt;tr&gt;&#xA;          &lt;td rowspan=&#34;1&#34;&gt;&#xA;            &lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&#xA;            &lt;/b&gt;&#xA;            &lt;i&gt; on&#xA;            &lt;/i&gt;&#xA;            &lt;span class=&#34;vgi-stack&#34;&gt;Windows, MacOS, Linux&#xA;            &lt;/span&gt;&#xA;            &lt;br&gt;&#xA;            &lt;a class=&#34;vgi-ext&#34; href=&#34;https://github.com/Velocidex/velociraptor&#34;&gt;source repo&#xA;            &lt;/a&gt;&#xA;            &lt;br&gt;&#xA;            &lt;span class=&#34;vgi-impact&#34;&gt;Default status is unaffected&#xA;            &lt;/span&gt;&#xA;          &lt;/td&gt;&#xA;          &lt;td&gt; before 0.74.3&#xA;            &lt;br&gt;&#xA;          &lt;/td&gt;&#xA;        &lt;/tr&gt;&#xA;      &lt;/tbody&gt;&#xA;    &lt;/table&gt;&#xA;    &lt;br style=&#34;font-size:0;&#34;&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;workaround&#34;&gt;&#xA;    &lt;h2&gt;Workaround:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;To better restrict the types of artifacts users can run, the `basic artifacts` mechanism should be used as described&amp;nbsp;&#xA;      &lt;a target=&#34;_blank&#34; rel=&#34;nofollow&#34; href=&#34;https://docs.velociraptor.app/docs/artifacts/security/#basic-artifacts&#34;&gt;https://docs.velociraptor.app/docs/artifacts/security/#basic-artifacts&#xA;      &lt;/a&gt;&#xA;      &lt;br&gt;&#xA;      &lt;br&gt;To detect unintended privilege escalations in custom artifacts, users should run the artifact verifier as described here&amp;nbsp;&#xA;      &lt;a target=&#34;_blank&#34; rel=&#34;nofollow&#34; href=&#34;https://docs.velociraptor.app/docs/artifacts/security/#restricting-dangerous-client-artifacts&#34;&gt;https://docs.velociraptor.app/docs/artifacts/security/#restricting-dangerous-client-artifacts&#xA;      &lt;/a&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;    &lt;h2&gt;Credits:&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;We thank Christian Fünfhaus  from Deutsche Bahn CSIRT for identifying and reporting this issue&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;references&#34;&gt;&#xA;    &lt;h2&gt;References&#xA;    &lt;/h2&gt;&#xA;    &lt;p&gt;&#xA;    &lt;/p&gt;&#xA;    &lt;div&gt;&#xA;      &lt;a href=&#34;https://docs.velociraptor.app/announcements/advisories/cve-2025-6264/&#34;&gt;docs.velociraptor.app/announcements/advisories/cve-2025-6264/&#xA;      &lt;/a&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;p&gt;&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;</description>
    </item>
    <item>
      <title>CVE-2025-0914 Velociraptor Shell Plugin prevent_execve bypass</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2025-0914/</link>
      <pubDate>Tue, 25 Feb 2025 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2025-0914/</guid>
      <description>&#xA;&lt;div class=&#34;cve&#34;&gt;&#xA;  &lt;span&gt;Published&lt;/span&gt;on 2025-02-25&#xA;&#xA;  &lt;details class=&#34;popup&#34;&gt;&#xA;    &lt;summary class=&#34;lbl rnd sec CVSS LOW&#34;&gt;CVSS · LOW ·&#xA;      3.8&lt;sub&gt;⁄10&lt;/sub&gt; &lt;span style=&#34;font-size:0px;opacity:0&#34;&gt;·&#xA;        CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N&lt;/span&gt;&lt;/summary&gt;&#xA;    &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&lt;span&gt;Scoring scenario:&lt;/span&gt;&#xA;      GENERAL&#xA;      &lt;div&gt;attackVector: &lt;b&gt;NETWORK&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;attackComplexity: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;privilegesRequired: &lt;b&gt;HIGH&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;userInteraction: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;scope: &lt;b&gt;UNCHANGED&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;confidentialityImpact: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;integrityImpact: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;availabilityImpact: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;      &lt;div&gt;&lt;a class=&#34;vgi-dial&#34; href=&#xA;              &#34;https://cvss.js.org/#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N&#34;&#xA;              target=&#34;_blank&#34;&gt;Open CVSS Calc&lt;/a&gt;&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/details&gt;&#xA;  &lt;div id=&#34;description&#34;&gt;&#xA;    &lt;p&gt;&#xA;      An improper access control issue in the VQL shell feature in&#xA;      Velociraptor Versions &amp;lt; 0.73.4 allowed authenticated users to&#xA;      execute the execve() plugin in deployments where this was&#xA;      explicitly forbidden by configuring the prevent_execve flag in the&#xA;      configuration file.&#xA;    &lt;/p&gt;&#xA;&#xA;    &lt;p&gt;&#xA;      This setting is not usually recommended and is uncommonly used,&#xA;      so this issue will only affect users who do set it.&#xA;    &lt;/p&gt;&#xA;&#xA;    &lt;p&gt;&#xA;      This issue is fixed in release 0.73.4&#xA;    &lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;configs&#34;&gt;&#xA;    &lt;h2&gt;Required configuration for exposure:&lt;/h2&gt;&#xA;    &lt;p&gt;Requires the prevent_execve option to be enabled.&lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;problem&#34;&gt;&#xA;    &lt;h2&gt;Problem:&lt;/h2&gt;&#xA;    &lt;p&gt;CWE-281 Improper Preservation of Permissions &lt;a href=&#xA;                                                       &#34;https://cwe.mitre.org/data/definitions/281&#34; target=&#xA;                                                       &#34;_blank&#34;&gt;&lt;small&gt;CWE-281&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;impact&#34;&gt;&#xA;    &lt;h2&gt;Impact:&lt;/h2&gt;&#xA;    &lt;p&gt;CAPEC-176 Configuration/Environment Manipulation &lt;a href=&#xA;                                                           &#34;https://capec.mitre.org/data/definitions/176&#34; target=&#xA;                                                           &#34;_blank&#34;&gt;&lt;small&gt;CAPEC-176&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;exploits&#34;&gt;&#xA;    &lt;h2&gt;Exploits:&lt;/h2&gt;&#xA;    &lt;p&gt;Using the query() plugin it is possible to run the execve()&#xA;      plugin on systems where the prevent_execve configuration parameter&#xA;      is set.&lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;status&#34;&gt;&#xA;    &lt;h2&gt;Product Status:&lt;/h2&gt;&#xA;    &lt;table class=&#34;striped&#34;&gt;&#xA;      &lt;colgroup&gt;&#xA;        &lt;col&gt;&#xA;        &lt;col class=&#34;affectedCol&#34;&gt;&lt;/colgroup&gt;&#xA;      &lt;thead&gt;&#xA;        &lt;tr&gt;&#xA;          &lt;th&gt;Product&lt;/th&gt;&#xA;          &lt;th&gt;Affected&lt;/th&gt;&#xA;        &lt;/tr&gt;&#xA;      &lt;/thead&gt;&#xA;      &lt;tbody&gt;&#xA;        &lt;tr&gt;&#xA;          &lt;td rowspan=&#34;1&#34;&gt;&lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&lt;/b&gt;&#xA;            &lt;i&gt;on&lt;/i&gt; &lt;span class=&#34;vgi-stack&#34;&gt;Windows, MacOS, Linux, x86, ARM,&#xA;              64 bit, 32 bit&lt;/span&gt;&lt;br&gt;&#xA;            &lt;br&gt;&#xA;            &lt;span class=&#34;vgi-impact&#34;&gt;Default status is unaffected&lt;/span&gt;&lt;/td&gt;&#xA;          &lt;td&gt;before 0.73.4&lt;br&gt;&lt;/td&gt;&#xA;        &lt;/tr&gt;&#xA;      &lt;/tbody&gt;&#xA;    &lt;/table&gt;&#xA;    &lt;br style=&#34;font-size:0;&#34;&gt;&lt;/div&gt;&#xA;  &lt;div id=&#34;solution&#34;&gt;&#xA;    &lt;h2&gt;Solution:&lt;/h2&gt;&#xA;    &lt;p&gt;Upgrade endpoint agent to release 0.73.4&lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;    &lt;h2&gt;Credits:&lt;/h2&gt;&#xA;    &lt;p&gt;Darragh O&#39;Reilly, SUSE&lt;/p&gt;&#xA;  &lt;/div&gt;&#xA;  &lt;div id=&#34;references&#34;&gt;&#xA;    &lt;h2&gt;References&lt;/h2&gt;&#xA;    &lt;div&gt;&lt;a href=&#34;https://docs.velociraptor.app/announcements/advisories/CVE-2025-0914/&#34;&gt;&#xA;        docs.velociraptor.app/announcements/advisories/CVE-2025-0914/&#xA;    &lt;/a&gt;&lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;</description>
    </item>
    <item>
      <title>CVE-2024-10526 Local Privilege Escalation In Windows Velociraptor Service</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2024-10526/</link>
      <pubDate>Sun, 03 Nov 2024 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2024-10526/</guid>
      <description>&#xA;&lt;div class=&#34;cve&#34;&gt;&#xA;&#xA;  &lt;span&gt;Published&lt;/span&gt; on 2024-11-03&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div id=&#34;description&#34;&gt;&lt;b class=&#34;tag rnd CVSS MEDIUM&#34;&gt;x_open-source&lt;/b&gt;   &lt;p&gt;The Velociraptor Windows MSI installer creates the installation directory with WRITE_DACL permission to the BUILTIN\Users group. This allows local users who are not administrators to grant themselves the Full Control permission on Velociraptor&#39;s files. By modifying Velociraptor&#39;s files, local users can subvert the binary and cause the Velociraptor service to execute arbitrary code as the SYSTEM user, or to replace the Velociraptor binary completely.&lt;br&gt;&lt;/p&gt;&lt;/div&gt;&lt;div id=&#34;problem&#34;&gt;&lt;h2&gt;Problem: &lt;/h2&gt;&lt;p&gt;CWE-552 Files or Directories Accessible to External Parties  &lt;a href=&#34;https://cwe.mitre.org/data/definitions/552&#34; target=&#34;_blank&#34;&gt;&lt;small&gt;CWE-552&lt;/small&gt;&lt;/a&gt;&lt;br&gt;CWE-732 Incorrect Permission Assignment for Critical Resource  &lt;a href=&#34;https://cwe.mitre.org/data/definitions/732&#34; target=&#34;_blank&#34;&gt;&lt;small&gt;CWE-732&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;&lt;div id=&#34;impact&#34;&gt;&lt;h2&gt;Impact:  &lt;/h2&gt;&lt;p&gt;CAPEC-165 File Manipulation  &lt;a href=&#34;https://capec.mitre.org/data/definitions/165&#34; target=&#34;_blank&#34;&gt;&lt;small&gt;CAPEC-165&lt;/small&gt;&lt;/a&gt;&lt;br&gt;CAPEC-233 Privilege Escalation  &lt;a href=&#34;https://capec.mitre.org/data/definitions/233&#34; target=&#34;_blank&#34;&gt;&lt;small&gt;CAPEC-233&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&lt;/div&gt;&lt;div id=&#34;status&#34;&gt;&lt;h2&gt;Product Status:&lt;/h2&gt;&lt;table class=&#34;striped&#34;&gt;&lt;colgroup&gt;&lt;col&gt;&lt;col class=&#34;affectedCol&#34;&gt;&lt;/colgroup&gt;&lt;thead&gt;&lt;tr&gt;&lt;th&gt;Product&lt;/th&gt;&lt;th&gt;Affected&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td rowspan=&#34;1&#34;&gt;&lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&lt;/b&gt;&lt;span&gt; » MSI Installer&lt;/span&gt;&lt;i&gt; on &lt;/i&gt; &lt;span class=&#34;vgi-stack&#34;&gt;Windows&lt;/span&gt;&lt;br&gt;&lt;a class=&#34;vgi-ext&#34; href=&#34;https://github.com/Velocidex/velociraptor&#34;&gt;source repo&lt;/a&gt;&lt;span class=&#34;vgi-text&#34;&gt;&#xA;            &lt;a href=&#34;https://github.com/Velocidex/velociraptor/blob/master/docs/wix/velociraptor_amd64.xml&#34;&gt;&#xA;              https://github.com/Velocidex/velociraptor/blob/master/docs/wix/velociraptor_amd64.xml&#xA;            &lt;/a&gt;&#xA;&#xA;          &lt;/span&gt;&lt;br&gt;&lt;span class=&#34;vgi-impact&#34;&gt;Default status is unaffected&lt;/span&gt;&lt;/td&gt;&lt;td&gt; before 0.73.3 (unaffected from 0.73.3)&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br style=&#34;font-size:0;&#34;&gt;&lt;/div&gt;&lt;div id=&#34;solution&#34;&gt;&lt;h2&gt;Solution:&lt;/h2&gt;&lt;p&gt;For new installs use the updated MSI. If you do not wish to upgrade the endpoint client at this time, please arrange to run the icacls.exe command sequence described below at the earliest time.&lt;/p&gt;&lt;/div&gt;&lt;div id=&#34;workaround&#34;&gt;&lt;h2&gt;Workaround:&lt;/h2&gt;&lt;p&gt;In the Velociraptor start a hunt over all your Windows Assets, select the&amp;nbsp;Windows.System.PowerShell artifact and paste the following in the&amp;nbsp;Command parameter:&lt;br&gt;&lt;br&gt;&#xA;&#xA;&lt;pre&gt;&lt;code class=&#34;language-bash&#34;&gt;&#xA;    icacls.exe &#34;c:\Program Files\Velociraptor&#34; /inheritance:d /t /c&#xA;    icacls.exe &#34;c:\Program Files\Velociraptor&#34; /remove builtin\users /t /c&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&#xA;&lt;br&gt;&lt;br&gt;&lt;br&gt;This hunt will update the ACLs on the Velociraptor directory to remove all BUILTIN\Users permissions.&lt;/p&gt;&#xA;&#xA;&lt;p&gt;To verify the correct permissions after a new MSI install, use the following command&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code class=&#34;language-bash&#34;&gt;&#xA;    C:&gt; icacls &#34;c:\Program Files\Velociraptor&#34;&#xA;    c:\Program Files\Velociraptor BUILTIN\Users:(OI)(CI)(DENY)(S)&#xA;                                  BUILTIN\Administrators:(OI)(CI)(F)&#xA;                                  NT AUTHORITY\SYSTEM:(OI)(CI)(F)&#xA;&#xA;    Successfully processed 1 files; Failed processing 0 files&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&#xA;  &lt;p&gt;This should show a DENY rule for BUILTIN\Users&lt;/p&gt;&#xA;  &lt;p&gt;If applying the commands above, all permissions will be removed for the builtin\users group&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code class=&#34;language-bash&#34;&gt;&#xA;    C:&gt; icacls &#34;c:\Program Files\Velociraptor&#xA;    c:\Program Files\Velociraptor BUILTIN\Administrators:(OI)(CI)(F)&#xA;                                  NT AUTHORITY\SYSTEM:(OI)(CI)(F)&#xA;&#xA;    Successfully processed 1 files; Failed processing 0 files&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&#xA;&lt;/div&gt;&#xA;&lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&lt;h2&gt;Credits:&lt;/h2&gt;&lt;p&gt;We thank Jean-Baptiste Mesnard-Sense from SYNACKTIV for identifying and reporting this issue&lt;/p&gt;&lt;/div&gt;&lt;div id=&#34;timeline&#34;&gt;&lt;h2&gt;Timeline:&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;2024-10-28 - Initial Notification by SYNACKTIV&lt;/li&gt;&lt;li&gt;2024-11-03 - 0.73.3 was released to address this issue and an advisory published on Velociraptor&#39;s website.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;div id=&#34;references&#34;&gt;&lt;h2&gt;References&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;&lt;a href=&#34;https://docs.velociraptor.app/announcements/advisories/&#34;&gt;docs.velociraptor.app/announcements/advisories/&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&#xA;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;</description>
    </item>
    <item>
      <title>CVE-2023-5950  Rapid7 Velociraptor Reflected XSS</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-5950/</link>
      <pubDate>Mon, 06 Nov 2023 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-5950/</guid>
      <description>&#xA;&lt;!DOCTYPE html&gt;&#xA;&lt;html&gt;&#xA;  &lt;head&gt;&#xA;    &lt;meta name=&#34;generator&#34; content=&#xA;          &#34;HTML Tidy for HTML5 for Linux version 5.6.0&#34;&gt;&#xA;      &lt;title&gt;&lt;/title&gt;&#xA;    &lt;/head&gt;&#xA;    &lt;body&gt;&#xA;      &lt;p&gt;&lt;span&gt;Published&lt;/span&gt; on 2023-11-06&lt;/p&gt;&#xA;      &lt;details class=&#34;popup&#34;&gt;&#xA;        &lt;summary class=&#34;lbl rnd sec CVSS HIGH&#34;&gt;CVSS · HIGH ·&#xA;        8.6&lt;sub&gt;⁄10&lt;/sub&gt; &lt;span style=&#34;font-size:0px;opacity:0&#34;&gt;·&#xA;        CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L&lt;/span&gt;&lt;/summary&gt;&#xA;        &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&lt;span&gt;Scoring scenario:&lt;/span&gt;&#xA;        GENERAL&#xA;        &lt;div&gt;attackVector: &lt;b&gt;NETWORK&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;attackComplexity: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;privilegesRequired: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;userInteraction: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;scope: &lt;b&gt;UNCHANGED&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;confidentialityImpact: &lt;b&gt;HIGH&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;integrityImpact: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;availabilityImpact: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;        &lt;div&gt;&lt;a class=&#34;vgi-dial&#34; href=&#xA;                &#34;https://cvss.js.org/#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L&#34;&#xA;                target=&#34;_blank&#34;&gt;Open CVSS Calc&lt;/a&gt;&lt;/div&gt;&#xA;        &lt;/div&gt;&#xA;      &lt;/details&gt;&#xA;      &lt;div id=&#34;description&#34;&gt;&#xA;        &lt;p&gt;Rapid7 Velociraptor versions prior to 0.7.0-4 suffer from a&#xA;        reflected cross site scripting vulnerability. This vulnerability&#xA;        allows attackers to inject JS into the error path, potentially&#xA;        leading to unauthorized execution of scripts within a user&#39;s web&#xA;        browser.&amp;nbsp;This vulnerability is fixed in version 0.7.0-4 and&#xA;        a patch is available to download. Patches are also&#xA;        available for version 0.6.9 (0.6.9-1)&lt;br&gt;&#xA;&#xA;        This issue affects the server only.&#xA;        &lt;br&gt;&lt;/p&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div id=&#34;problem&#34;&gt;&#xA;        &lt;h2&gt;Problem:&lt;/h2&gt;&#xA;        &lt;p&gt;CWE-79 Improper Neutralization of Input During Web Page&#xA;        Generation (&#39;Cross-site Scripting&#39;) &lt;a href=&#xA;        &#34;https://cwe.mitre.org/data/definitions/CWE-79&#34; target=&#xA;        &#34;_blank&#34;&gt;&lt;small&gt;CWE-79&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;      &lt;/div&gt;&#xA;      &lt;div id=&#34;status&#34;&gt;&#xA;        &lt;h2&gt;Product Status:&lt;/h2&gt;&#xA;        &lt;table class=&#34;striped&#34;&gt;&#xA;          &lt;colgroup&gt;&#xA;            &lt;col&gt;&#xA;              &lt;col class=&#34;affectedCol&#34;&gt;&lt;/colgroup&gt;&#xA;              &lt;thead&gt;&#xA;                &lt;tr&gt;&#xA;                  &lt;th&gt;Product&lt;/th&gt;&#xA;                  &lt;th&gt;Affected&lt;/th&gt;&#xA;                &lt;/tr&gt;&#xA;              &lt;/thead&gt;&#xA;              &lt;tbody&gt;&#xA;                &lt;tr&gt;&#xA;                  &lt;td rowspan=&#34;1&#34;&gt;&lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&lt;/b&gt;&lt;/td&gt;&#xA;                  &lt;td&gt;before 0.7.0-4&lt;/td&gt;&#xA;                &lt;/tr&gt;&#xA;              &lt;/tbody&gt;&#xA;            &lt;/table&gt;&#xA;            &lt;br style=&#34;font-size:0;&#34;&gt;&lt;/div&gt;&#xA;            &lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;              &lt;h2&gt;Credits:&lt;/h2&gt;&#xA;              &lt;p&gt;Mathias Kujala&lt;/p&gt;&#xA;            &lt;/div&gt;&#xA;            &lt;div id=&#34;references&#34;&gt;&#xA;              &lt;h2&gt;References&lt;/h2&gt;&#xA;              &lt;div&gt;&lt;a href=&#xA;                      &#34;https://docs.velociraptor.app/blog/2023/2023-07-27-release-notes-0.7.0/&#34;&gt;&#xA;              docs.velociraptor.app/blog/2023/2023-07-27-release-notes-0.7.0/&lt;/a&gt;&lt;/div&gt;&#xA;            &lt;/div&gt;&#xA;            &lt;div id=&#34;timeline&#34;&gt;&#xA;              &lt;h2&gt;Timeline:&lt;/h2&gt;&#xA;              &lt;ul&gt;&#xA;                &lt;li&gt;2023-11-02 - Notification of the issue&lt;/li&gt;&#xA;                &lt;li&gt;2023-11-06 - Release 0.7.0-4 made available on GitHub&lt;/li&gt;&#xA;              &lt;/ul&gt;&#xA;            &lt;/div&gt;&#xA;          &lt;/body&gt;&#xA;        &lt;/html&gt;&#xA;&#xA;&#xA;</description>
    </item>
    <item>
      <title>CVE-2023-2226  Velociraptor crashes while parsing some malformed PE or OLE files</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-2226/</link>
      <pubDate>Fri, 21 Apr 2023 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-2226/</guid>
      <description>&#xA;&lt;p&gt;&lt;span&gt;Published&lt;/span&gt; on 2023-04-21&lt;/p&gt;&#xA;&lt;details class=&#34;popup&#34;&gt;&#xA;  &lt;summary class=&#34;lbl rnd sec CVSS LOW&#34;&gt;CVSS · LOW ·&#xA;    3.3&lt;sub&gt;⁄10&lt;/sub&gt; &lt;span style=&#34;font-size:0px;opacity:0&#34;&gt;·&#xA;      CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&lt;/span&gt;&lt;/summary&gt;&#xA;  &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&lt;span&gt;Scoring scenario:&lt;/span&gt;&#xA;    GENERAL&#xA;    &lt;div&gt;attackVector: &lt;b&gt;LOCAL&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;attackComplexity: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;privilegesRequired: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;userInteraction: &lt;b&gt;REQUIRED&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;scope: &lt;b&gt;UNCHANGED&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;confidentialityImpact: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;integrityImpact: &lt;b&gt;NONE&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;availabilityImpact: &lt;b&gt;LOW&lt;/b&gt;&lt;/div&gt;&#xA;    &lt;div&gt;&lt;a class=&#34;vgi-dial&#34; href=&#xA;            &#34;https://cvss.js.org/#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L&#34;&#xA;            target=&#34;_blank&#34;&gt;Open CVSS Calc&lt;/a&gt;&lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/details&gt;&#xA;&lt;div id=&#34;description&#34;&gt;&#xA;  &lt;p&gt;Due to insufficient validation in the PE and OLE parsers in&#xA;    Rapid7&#39;s Velociraptor versions earlier than 0.6.8 allows attacker&#xA;    to crash Velociraptor during parsing of maliciously malformed&#xA;    files.&amp;nbsp;&lt;br&gt;&#xA;    &lt;br&gt;&#xA;    For this attack to succeed, the attacker needs to be able to&#xA;    introduce malicious files to the system at the same time that&#xA;    Velociraptor attempts to collect any artifacts that attempt to&#xA;    parse PE files, Authenticode signatures, or OLE files. After&#xA;    crashing, the Velociraptor service will restart and it will still&#xA;    be possible to collect other artifacts.&lt;br&gt;&#xA;    &lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;problem&#34;&gt;&#xA;  &lt;h4 class=&#34;vgi-bug&#34;&gt;Problem:&lt;/h4&gt;&#xA;  &lt;p&gt;CWE-125 Out-of-bounds Read &lt;a href=&#xA;                                   &#34;https://cwe.mitre.org/data/definitions/CWE-125&#34; target=&#xA;                                   &#34;_blank&#34;&gt;&lt;small&gt;CWE-125&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;impact&#34;&gt;&#xA;  &lt;h4 class=&#34;vgi-impact&#34;&gt;Impact:&lt;/h4&gt;&#xA;  &lt;p&gt;CAPEC-540 Overread Buffers &lt;a href=&#xA;                                   &#34;https://capec.mitre.org/data/definitions/CAPEC-540&#34; target=&#xA;                                   &#34;_blank&#34;&gt;&lt;small&gt;CAPEC-540&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;status&#34;&gt;&#xA;  &lt;h4&gt;Affected Product Status:&lt;/h4&gt;&#xA;  &lt;table class=&#34;tbl gap&#34;&gt;&#xA;    &lt;colgroup&gt;&#xA;      &lt;col&gt;&#xA;      &lt;col class=&#34;affectedCol&#34;&gt;&lt;/colgroup&gt;&#xA;    &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;        &lt;th&gt;Product&lt;/th&gt;&#xA;        &lt;th&gt;Affected&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;    &lt;/thead&gt;&#xA;    &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;        &lt;td rowspan=&#34;1&#34;&gt;&lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&lt;/b&gt;&#xA;          &lt;span&gt;» PE Parser, OLE parser, Authenticode parser&lt;/span&gt; &lt;i&gt;on&lt;/i&gt;&#xA;          &lt;span class=&#34;vgi-stack&#34;&gt;Windows&lt;/span&gt;&lt;br&gt;&#xA;          &lt;a class=&#34;vgi-package&#34; href=&#xA;             &#34;https://github.com/Velocidex/velociraptor/releases&#34;&gt;package&#xA;            repo&lt;/a&gt;&lt;a class=&#34;vgi-ext&#34; href=&#xA;                       &#34;https://github.com/Velocidex/velociraptor/&#34;&gt;source repo&lt;/a&gt;&lt;br&gt;&#xA;          &lt;span class=&#34;vgi-impact&#34;&gt;Default status is unaffected&lt;/span&gt;&lt;/td&gt;&#xA;        &lt;td&gt;before 0.6.8&lt;br&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;    &lt;/tbody&gt;&#xA;  &lt;/table&gt;&#xA;  &lt;br style=&#34;font-size:0;&#34;&gt;&lt;/div&gt;&#xA;&lt;div id=&#34;solution&#34;&gt;&#xA;  &lt;h4 class=&#34;vgi-safe&#34;&gt;Solution:&lt;/h4&gt;&#xA;  &lt;p&gt;Upgrade the clients to version 0.6.8-2&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;  &lt;h4 class=&#34;vgi-like&#34;&gt;Credits:&lt;/h4&gt;&#xA;  &lt;p&gt;Thanks to b1tg https://github.com/b1tg for reporting these&#xA;    issues and providing samples that trigger the crashes&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;</description>
    </item>
    <item>
      <title>CVE-2023-0242  Insufficient Permission Check In The VQL Copy() Function</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-0242/</link>
      <pubDate>Wed, 18 Jan 2023 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-0242/</guid>
      <description>&#xA;&lt;p&gt;&lt;span&gt;Published&lt;/span&gt; on 2023-01-18&lt;/p&gt;&#xA;&lt;details class=&#34;popup&#34;&gt;&#xA;  &lt;summary class=&#34;lbl rnd sec CVSS HIGH&#34;&gt;&#xA;    CVSS · HIGH · 8.1&lt;sub&gt;⁄10&lt;/sub&gt; &lt;span style=&#34;font-size:0px;opacity:0&#34;&gt;·&#xA;      CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N&lt;/span&gt;&#xA;  &lt;/summary&gt;&#xA;  &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&#xA;    &lt;span&gt;Scoring scenario:&lt;/span&gt; GENERAL&#xA;    &lt;div&gt;&#xA;      attackVector: &lt;b&gt;NETWORK&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      attackComplexity: &lt;b&gt;LOW&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      privilegesRequired: &lt;b&gt;HIGH&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      userInteraction: &lt;b&gt;REQUIRED&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      scope: &lt;b&gt;CHANGED&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      confidentialityImpact: &lt;b&gt;HIGH&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      integrityImpact: &lt;b&gt;HIGH&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      availabilityImpact: &lt;b&gt;NONE&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      &lt;a class=&#34;vgi-dial&#34; href=&#xA;         &#34;https://cvss.js.org/#CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N&#34;&#xA;         target=&#34;_blank&#34;&gt;Open CVSS Calc&lt;/a&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/details&gt;&#xA;&lt;div id=&#34;description&#34;&gt;&#xA;  &lt;p&gt;Improper Privilege Management vulnerability in Rapid7&#xA;    Velociraptor in the copy() function.&lt;br&gt;&#xA;    &lt;br&gt;&#xA;    Velociraptor allows users to be created with different&#xA;    privileges on the server. Administrators are generally&#xA;    allowed to run any command on the server including writing&#xA;    arbitrary files. However, lower privilege users are generally&#xA;    forbidden from writing or modifying files on the server.&lt;br&gt;&#xA;    &lt;br&gt;&#xA;    The VQL copy() function applies permission checks for reading&#xA;    files but does not check for permission to write files. This&#xA;    allows a low privilege user (e.g. users with the Velociraptor&#xA;    &#34;investigator&#34; role) to overwrite files on the server,&#xA;    including Velociraptor configuration files.&lt;br&gt;&#xA;    &lt;br&gt;&#xA;    To exploit this vulnerability, the attacker must already have&#xA;    a Velociraptor user account at a low privilege level (at&#xA;    least &#34;analyst&#34;). Be able to log into the GUI and create a&#xA;    notebook where they can run the VQL query invoking the copy()&#xA;    VQL function. Typically most users deploy Velociraptor with&#xA;    limited access to a trusted group (most users will be&#xA;    administrators within the GUI).&lt;br&gt;&lt;/p&gt;&#xA;  &lt;p&gt;This vulnerability is associated with program files&#xA;    &lt;tt&gt;&lt;a target=&#34;_blank&#34; rel=&#34;nofollow&#34; href=&#xA;           &#34;https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go&#34;&gt;&#xA;        https://github.Com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go&lt;/a&gt;&lt;/tt&gt;&#xA;    and program routines &lt;tt&gt;copy()&lt;/tt&gt;.&lt;/p&gt;&#xA;  &lt;p&gt;This issue affects Velociraptor: before 0.6.7-5.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;configs&#34;&gt;&#xA;  &lt;h2&gt;Required configuration for exposure:&lt;/h2&gt;&#xA;  &lt;p&gt;Velociraptor deployment with multiple users at lower roles&#xA;    than administrators (e.g. &#34;investigator&#34; and above)&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;problem&#34;&gt;&#xA;  &lt;h2&gt;Problem:&lt;/h2&gt;&#xA;  &lt;p&gt;CWE-269 Improper Privilege Management &lt;a href=&#xA;                                              &#34;https://cwe.mitre.org/data/definitions/CWE-269&#34; target=&#xA;                                              &#34;_blank&#34;&gt;&lt;small&gt;CWE-269&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;impact&#34;&gt;&#xA;  &lt;h2&gt;Impact:&lt;/h2&gt;&#xA;  &lt;p&gt;CAPEC-75 Manipulating Writeable Configuration Files&#xA;    &lt;a href=&#34;https://capec.mitre.org/data/definitions/CAPEC-75&#34;&#xA;       target=&#34;_blank&#34;&gt;&lt;small&gt;CAPEC-75&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;status&#34;&gt;&#xA;  &lt;h2&gt;Product Status:&lt;/h2&gt;&#xA;  &lt;table class=&#34;striped&#34;&gt;&#xA;    &lt;colgroup&gt;&#xA;      &lt;col&gt;&#xA;      &lt;col class=&#34;affectedCol&#34;&gt;&#xA;    &lt;/colgroup&gt;&#xA;    &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;        &lt;th&gt;Product&lt;/th&gt;&#xA;        &lt;th&gt;Affected&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;    &lt;/thead&gt;&#xA;    &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;        &lt;td rowspan=&#34;1&#34;&gt;&#xA;          &lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&lt;/b&gt;&#xA;          &lt;span&gt;» VQL copy() function&lt;/span&gt; &lt;i&gt;on&lt;/i&gt;&#xA;          &lt;span class=&#34;vgi-stack&#34;&gt;Linux, Windows, MacOS, 64&#xA;            bit, 32 bit&lt;/span&gt;&lt;br&gt;&#xA;          &lt;a class=&#34;vgi-package&#34; href=&#xA;             &#34;https://github.com/Velocidex/velociraptor/releases&#34;&gt;package&#xA;            repo&lt;/a&gt;&lt;a class=&#34;vgi-ext&#34; href=&#xA;                       &#34;https://github.com/Velocidex/velociraptor/&#34;&gt;source&#xA;            repo&lt;/a&gt;&lt;span class=&#xA;                          &#34;vgi-text&#34;&gt;https://github.com/Velocidex/velociraptor/blob/master/vql/filesystem/copy.go&lt;/span&gt;&lt;span class=&#34;vgi-edit&#34;&gt;copy()&lt;/span&gt;&lt;br&gt;&#xA;&#xA;          &lt;span class=&#34;vgi-impact&#34;&gt;Default status is&#xA;            unaffected&lt;/span&gt;&#xA;        &lt;/td&gt;&#xA;        &lt;td&gt;before 0.6.7-5 (unaffected from 5)&lt;br&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;    &lt;/tbody&gt;&#xA;  &lt;/table&gt;&lt;br style=&#34;font-size:0;&#34;&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;solution&#34;&gt;&#xA;  &lt;h2&gt;Solution:&lt;/h2&gt;&#xA;  &lt;p&gt;Upgrade to 0.6.7-5&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;workaround&#34;&gt;&#xA;  &lt;h2&gt;Workaround:&lt;/h2&gt;&#xA;  &lt;p&gt;A valid workaround is to prevent the copy function in the&#xA;    Velociraptor allow list:&lt;br&gt;&#xA;    &lt;br&gt;&#xA;    1. In the configuration wizard answer yes to the question &#34;Do&#xA;    you want to restrict VQL functionality on the server?&#34;&lt;br&gt;&#xA;    2. This will add a default allow list to the configuration&#xA;    file.&lt;br&gt;&#xA;    3. Copy this allow list to your existing&#xA;    server.config.yaml&lt;br&gt;&#xA;    4. Ensure the &#34;copy&#34; function is removed from the default&#xA;    allow list.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;  &lt;h2&gt;Credits:&lt;/h2&gt;&#xA;  &lt;p&gt;Paul Alkemade from Telstra&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;timeline&#34;&gt;&#xA;  &lt;h2&gt;Timeline:&lt;/h2&gt;&#xA;  &lt;ul&gt;&#xA;    &lt;li&gt;2023-01-12 - Notification of the issue&lt;/li&gt;&#xA;    &lt;li&gt;2023-01-17 - Release 0.6.7-5 made available on&#xA;      GitHub&lt;/li&gt;&#xA;  &lt;/ul&gt;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;</description>
    </item>
    <item>
      <title>CVE-2023-0290 Directory Traversal In Client Id Parameter</title>
      <link>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-0290/</link>
      <pubDate>Tue, 17 Jan 2023 00:00:00 +0000</pubDate>
      <guid>https://www.velociraptor-docs.org/announcements/advisories/cve-2023-0290/</guid>
      <description>&#xA;&lt;p&gt;&lt;span&gt;Published&lt;/span&gt; on 2023-01-17&lt;/p&gt;&#xA;&lt;details class=&#34;popup&#34;&gt;&#xA;  &lt;summary class=&#34;lbl rnd sec CVSS HIGH&#34;&gt;&#xA;    CVSS · HIGH · 8.1&lt;sub&gt;⁄10&lt;/sub&gt; &lt;span style=&#xA;                                          &#34;font-size:0px;opacity:0&#34;&gt;·&#xA;      CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N&lt;/span&gt;&#xA;  &lt;/summary&gt;&#xA;  &lt;div class=&#34;pop wht rnd shd pad bor&#34;&gt;&#xA;    &lt;span&gt;Scoring scenario:&lt;/span&gt; GENERAL&#xA;    &lt;div&gt;&#xA;      attackVector: &lt;b&gt;NETWORK&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      attackComplexity: &lt;b&gt;LOW&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      privilegesRequired: &lt;b&gt;HIGH&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      userInteraction: &lt;b&gt;REQUIRED&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      scope: &lt;b&gt;CHANGED&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      confidentialityImpact: &lt;b&gt;HIGH&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      integrityImpact: &lt;b&gt;HIGH&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      availabilityImpact: &lt;b&gt;NONE&lt;/b&gt;&#xA;    &lt;/div&gt;&#xA;    &lt;div&gt;&#xA;      &lt;a class=&#34;vgi-dial&#34; href=&#xA;         &#34;https://cvss.js.org/#CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N&#34;&#xA;         target=&#34;_blank&#34;&gt;Open CVSS Calc&lt;/a&gt;&#xA;    &lt;/div&gt;&#xA;  &lt;/div&gt;&#xA;&lt;/details&gt;&#xA;&lt;div id=&#34;description&#34;&gt;&#xA;  &lt;p&gt;Velociraptor did not properly sanitize the client id&#xA;    parameter to the CreateCollection API allowing a directory&#xA;    traversal in where the collection task could be written. It&#xA;    was possible to provide a client id of &#34;../clients/server&#34; to&#xA;    schedule the collection for the server (as a server&#xA;    artifact), but only require privileges to schedule&#xA;    collections on the client.&lt;br&gt;&#xA;    &lt;br&gt;&#xA;    Normally to schedule an artifact on the server requires the&#xA;    COLLECT_SERVER permissions (normally only granted to&#xA;    &#34;administrator&#34; role), but due to this issue it is sufficient&#xA;    to have the COLLECT_CLIENT privilege (normally granted to the&#xA;    &#34;investigator&#34; role)&lt;br&gt;&lt;/p&gt;&#xA;  &lt;p&gt;To exploit this vulnerability, the attacker must already&#xA;    have a Velociraptor user account at a low privilege level&#xA;    (not administrator but at least &#34;investigator&#34;).&amp;nbsp;Be able&#xA;    to authenticate to the GUI (e.g. via OAuth2) and issue an API&#xA;    call to the backend. Typically most users deploy Velociraptor&#xA;    with limited access to a trusted group (most users will be&#xA;    administrators within the GUI).&lt;br&gt;&#xA;    &lt;br&gt;&lt;/p&gt;&#xA;  &lt;p&gt;This vulnerability is associated with program files&#xA;    &lt;tt&gt;&lt;a target=&#34;_blank&#34; rel=&#34;nofollow&#34; href=&#xA;           &#34;https://github.Com/Velocidex/velociraptor/blob/master/services/launcher/launcher.go&#34;&gt;&#xA;        https://github.Com/Velocidex/velociraptor/blob/master/services/launcher/launcher.go&lt;/a&gt;&lt;/tt&gt;&#xA;    and program routines&#xA;    &lt;tt&gt;ScheduleArtifactCollection()&lt;/tt&gt;.&lt;/p&gt;&#xA;  &lt;p&gt;This issue affects Velociraptor: before 0.6.7-5.&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;configs&#34;&gt;&#xA;  &lt;h2&gt;Required configuration for exposure:&lt;/h2&gt;&#xA;  &lt;p&gt;Velociraptor deployment with multiple users at lower roles&#xA;    than administrators (e.g. &#34;investigators&#34;)&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;problem&#34;&gt;&#xA;  &lt;h2&gt;Problem:&lt;/h2&gt;&#xA;  &lt;p&gt;CWE-22 Improper Limitation of a Pathname to a Restricted&#xA;    Directory (&#39;Path Traversal&#39;) &lt;a href=&#xA;                                    &#34;https://cwe.mitre.org/data/definitions/CWE-22&#34; target=&#xA;                                    &#34;_blank&#34;&gt;&lt;small&gt;CWE-22&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;impact&#34;&gt;&#xA;  &lt;h2&gt;Impact:&lt;/h2&gt;&#xA;  &lt;p&gt;CAPEC-233 Privilege Escalation &lt;a href=&#xA;                                       &#34;https://capec.mitre.org/data/definitions/CAPEC-233&#34; target=&#xA;                                       &#34;_blank&#34;&gt;&lt;small&gt;CAPEC-233&lt;/small&gt;&lt;/a&gt;&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;status&#34;&gt;&#xA;  &lt;h2&gt;Product Status:&lt;/h2&gt;&#xA;  &lt;table class=&#34;striped&#34;&gt;&#xA;    &lt;colgroup&gt;&#xA;      &lt;col&gt;&#xA;      &lt;col class=&#34;affectedCol&#34;&gt;&#xA;    &lt;/colgroup&gt;&#xA;    &lt;thead&gt;&#xA;      &lt;tr&gt;&#xA;        &lt;th&gt;Product&lt;/th&gt;&#xA;        &lt;th&gt;Affected&lt;/th&gt;&#xA;      &lt;/tr&gt;&#xA;    &lt;/thead&gt;&#xA;    &lt;tbody&gt;&#xA;      &lt;tr&gt;&#xA;        &lt;td rowspan=&#34;1&#34;&gt;&#xA;          &lt;b class=&#34;vgi-package&#34;&gt;Rapid7 Velociraptor&lt;/b&gt;&#xA;          &lt;span&gt;» CreateCollection API&lt;/span&gt; &lt;i&gt;on&lt;/i&gt;&#xA;          &lt;span class=&#34;vgi-stack&#34;&gt;Windows, Linux, MacOS, 64&#xA;            bit, 32 bit&lt;/span&gt;&lt;br&gt;&#xA;          &lt;a class=&#34;vgi-package&#34; href=&#xA;             &#34;https://github.com/Velocidex/velociraptor/releases&#34;&gt;package&#xA;            repo&lt;/a&gt;&lt;a class=&#34;vgi-ext&#34; href=&#xA;                       &#34;https://github.com/Velocidex/velociraptor/&#34;&gt;source&#xA;            repo&lt;/a&gt;&lt;span class=&#xA;                          &#34;vgi-text&#34;&gt;https://github.com/Velocidex/velociraptor/blob/master/services/launcher/launcher.go&lt;/span&gt;&lt;span class=&#34;vgi-edit&#34;&gt;ScheduleArtifactCollection()&lt;/span&gt;&lt;br&gt;&#xA;&#xA;          &lt;span class=&#34;vgi-impact&#34;&gt;Default status is&#xA;            unaffected&lt;/span&gt;&#xA;        &lt;/td&gt;&#xA;        &lt;td&gt;before 0.6.7-5 (unaffected from 5)&lt;br&gt;&lt;/td&gt;&#xA;      &lt;/tr&gt;&#xA;    &lt;/tbody&gt;&#xA;  &lt;/table&gt;&lt;br style=&#34;font-size:0;&#34;&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;solution&#34;&gt;&#xA;  &lt;h2&gt;Solution:&lt;/h2&gt;&#xA;  &lt;p&gt;Upgrade to 0.6.7-5&lt;br&gt;&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div class=&#34;rnd pad sec vgap&#34; id=&#34;credits&#34;&gt;&#xA;  &lt;h2&gt;Credits:&lt;/h2&gt;&#xA;  &lt;p&gt;Paul Alkemade from Telstra&lt;/p&gt;&#xA;&lt;/div&gt;&#xA;&lt;div id=&#34;timeline&#34;&gt;&#xA;  &lt;h2&gt;Timeline:&lt;/h2&gt;&#xA;  &lt;ul&gt;&#xA;    &lt;li&gt;2023-01-13 - Notification of the issue&lt;/li&gt;&#xA;    &lt;li&gt;2023-01-17 - Release 0.6.7-5 made available on&#xA;      GitHub&lt;/li&gt;&#xA;  &lt;/ul&gt;&#xA;&lt;/div&gt;&#xA;&#xA;&#xA;</description>
    </item>
  </channel>
</rss>
