Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-45722

Опубликовано: 03 янв. 2024
Источник: nvd
CVSS3: 8.8
CVSS3: 9.8
EPSS Низкий

Описание

HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory.  The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:hcltech:dryice_myxalytics:5.9:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:dryice_myxalytics:6.0:*:*:*:*:*:*:*
cpe:2.3:a:hcltech:dryice_myxalytics:6.1:*:*:*:*:*:*:*

EPSS

Процентиль: 32%
0.00122
Низкий

8.8 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-22
CWE-22

Связанные уязвимости

CVSS3: 8.8
github
около 2 лет назад

HCL DRYiCE MyXalytics is impacted by path traversal arbitrary file read vulnerability because it uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory.  The product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Potential exploits can completely disrupt or take over the application.

EPSS

Процентиль: 32%
0.00122
Низкий

8.8 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-22
CWE-22