CVE-2023-37288

SmartBPM.NET component has a vulnerability of path traversal within its file download function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-7223-af8f8-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartsoft:smartbpm.net:6.70:*:*:*:*:*:*:*

History

13 Jul 2023, 18:58

Type Values Removed Values Added
CPE cpe:2.3:a:smartsoft:smartbpm.net:6.70:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.5
CWE CWE-23 CWE-22
References (CONFIRM) https://www.twcert.org.tw/tw/cp-132-7223-af8f8-1.html - (CONFIRM) https://www.twcert.org.tw/tw/cp-132-7223-af8f8-1.html - Third Party Advisory

10 Jul 2023, 07:15

Type Values Removed Values Added
Summary SmartBPM.NET has a vulnerability of using hard-coded authentication key. An unauthenticated remote attacker can exploit this vulnerability to access system with regular user privilege to read application data, and execute submission and approval processes. SmartBPM.NET component has a vulnerability of path traversal within its file download function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files.

10 Jul 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-10 02:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-37288

Mitre link : CVE-2023-37288

CVE.ORG link : CVE-2023-37288


JSON object : View

Products Affected

smartsoft

  • smartbpm.net
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-23

Relative Path Traversal