Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x76g-gm3f-g7cw

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.9

Описание

Silverpeas 5.15 through 6.0.2 is affected by an authenticated Directory Traversal vulnerability that can be triggered during file uploads because core/webapi/upload/FileUploadData.java mishandles a StringUtil.java call. This vulnerability enables regular users to write arbitrary files on the underlying system with privileges of the user running the application. Especially, an attacker may leverage the vulnerability to write an executable JSP file in an exposed web directory to execute commands on the underlying system.

Silverpeas 5.15 through 6.0.2 is affected by an authenticated Directory Traversal vulnerability that can be triggered during file uploads because core/webapi/upload/FileUploadData.java mishandles a StringUtil.java call. This vulnerability enables regular users to write arbitrary files on the underlying system with privileges of the user running the application. Especially, an attacker may leverage the vulnerability to write an executable JSP file in an exposed web directory to execute commands on the underlying system.

EPSS

Процентиль: 88%
0.04086
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.9
nvd
почти 7 лет назад

Silverpeas 5.15 through 6.0.2 is affected by an authenticated Directory Traversal vulnerability that can be triggered during file uploads because core/webapi/upload/FileUploadData.java mishandles a StringUtil.java call. This vulnerability enables regular users to write arbitrary files on the underlying system with privileges of the user running the application. Especially, an attacker may leverage the vulnerability to write an executable JSP file in an exposed web directory to execute commands on the underlying system.

EPSS

Процентиль: 88%
0.04086
Низкий

9.9 Critical

CVSS3

Дефекты

CWE-22