Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade wazuh/wazuh to version 4.12.0 or higher.
Affected versions of this package are vulnerable to Buffer Over-read in the w_expression_match() function when strlen() is called on a buffer that is not properly NULL terminated during its allocation in OS_CleanMSG. An attacker can access sensitive data by sending a specially crafted message to the manager process.