Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3xw6-3pf3-2m73

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An Arbitrary File Upload issue in the file browser of DIMO YellowBox CRM before 6.3.4 allows a standard authenticated user to deploy a new WebApp WAR file to the Tomcat server via Path Traversal, allowing remote code execution with SYSTEM privileges.

An Arbitrary File Upload issue in the file browser of DIMO YellowBox CRM before 6.3.4 allows a standard authenticated user to deploy a new WebApp WAR file to the Tomcat server via Path Traversal, allowing remote code execution with SYSTEM privileges.

EPSS

Процентиль: 86%
0.02749
Низкий

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 8.8
nvd
около 6 лет назад

An Arbitrary File Upload issue in the file browser of DIMO YellowBox CRM before 6.3.4 allows a standard authenticated user to deploy a new WebApp WAR file to the Tomcat server via Path Traversal, allowing remote code execution with SYSTEM privileges.

EPSS

Процентиль: 86%
0.02749
Низкий

Дефекты

CWE-434