An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is a Path Traversal for an Unzip operation. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. During the unzip operation, the code takes file paths from the ZIP archive and writes them to a Vocera temporary directory. Unfortunately, the code does not properly check if the file paths include directory traversal payloads that would escape the intended destination.
References
Configurations
Configuration 1 (hide)
|
History
04 Aug 2023, 18:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CPE | cpe:2.3:a:vocera:voice_server:*:*:*:*:*:*:*:* cpe:2.3:a:vocera:report_server:*:*:*:*:*:*:*:* |
|
References | (MISC) https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vocera-report-server-vulnerabilities--cve-2022-46898--cve-2022-4.html - Third Party Advisory | |
References | (MISC) https://www.stryker.com/us/en/about/governance/cyber-security/product-security/ - Not Applicable | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
25 Jul 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-25 20:15
Updated : 2024-10-30 14:35
NVD link : CVE-2022-46902
Mitre link : CVE-2022-46902
CVE.ORG link : CVE-2022-46902
JSON object : View
Products Affected
vocera
- report_server
- voice_server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')