Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows authenticated users to upload `template file` on the server, but does not need any authorization to be reached. When the JSP file is uploaded, the attacker just needs to connect to `/knowageqbeengine/foo.jsp` to gain code execution on the server. By exploiting this vulnerability, an attacker with low privileges can upload a JSP file to the `knowageqbeengine` directory and gain code execution capability on the server. This issue has been patched in Knowage version 8.1.8.
References
Link | Resource |
---|---|
https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc | Exploit Third Party Advisory |
Configurations
History
09 Aug 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:eng:knowage:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
04 Aug 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-04 19:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-38702
Mitre link : CVE-2023-38702
CVE.ORG link : CVE-2023-38702
JSON object : View
Products Affected
eng
- knowage
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')