Lucene search

K
cve[email protected]CVE-2023-36819
HistoryJul 03, 2023 - 7:15 p.m.

CVE-2023-36819

2023-07-0319:15:09
CWE-22
web.nvd.nist.gov
7
knowage
open source
business analytics
cve-2023-36819
security vulnerability
directory traversal
configuration file
patch

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.3%

Knowage is the professional open source suite for modern business analytics over traditional sources and big data systems. The endpoint _/knowage/restful-services/dossier/importTemplateFile_ allows authenticated users to download template hosted on the server. However, starting in the 6.x.x branch and prior to version 8.1.8, the application does not sanitize the _templateName_ parameter allowing an attacker to use *../* in it, and escaping the directory the template are normally placed and download any file from the system. This vulnerability allows a low privileged attacker to exfiltrate sensitive configuration file. This issue has been patched in Knowage version 8.1.8.

Affected configurations

Vulners
NVD
Node
knowagelabsknowage_serverRange<8.1.8
CPENameOperatorVersion
eng:knowageeng knowagelt8.1.8

CNA Affected

[
  {
    "vendor": "KnowageLabs",
    "product": "Knowage-Server",
    "versions": [
      {
        "version": "< 8.1.8",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.3%

Related for CVE-2023-36819